From b42074abd5fdc3b44d52d1be06dcdb86615e3284 Mon Sep 17 00:00:00 2001 From: "Cynthia A. E. Livingston" Date: Sun, 17 Mar 1991 02:14:13 -0800 Subject: [PATCH] macro and text revision (-mdoc version 3) SCCS-vsn: share/man/man8/adduser.8 6.8 SCCS-vsn: share/man/man8/intro.8 6.4 SCCS-vsn: share/man/man8/makedev.8 6.3 SCCS-vsn: share/man/man8/man8.hp300/crash.8 5.2 SCCS-vsn: share/man/man8/man8.hp300/format.8 5.2 SCCS-vsn: share/man/man8/man8.vax/drtest.8 6.3 SCCS-vsn: share/man/man8/man8.vax/installboot.8 7.2 SCCS-vsn: share/man/man8/rc.8 6.2 SCCS-vsn: share/man/man8/sticky.8 6.4 SCCS-vsn: usr.bin/renice/renice.8 6.5 SCCS-vsn: usr.bin/showmount/showmount.8 6.3 SCCS-vsn: usr.bin/uucp/uucico/uucico.8 6.6 SCCS-vsn: usr.bin/uucp/uuclean/uuclean.8 6.6 SCCS-vsn: usr.bin/uucp/uupoll/uupoll.8 6.5 SCCS-vsn: usr.bin/uucp/uusnap/uusnap.8 6.4 SCCS-vsn: usr.bin/uucp/uuxqt/uuxqt.8 6.4 SCCS-vsn: usr.sbin/ac/ac.8 6.3 SCCS-vsn: usr.sbin/amd/amd/amd.8 5.2 SCCS-vsn: usr.sbin/amd/amq/amq.8 5.2 SCCS-vsn: old/arff/arff.8 6.5 SCCS-vsn: usr.sbin/arp/arp.8 6.5 SCCS-vsn: usr.sbin/bad144/bad144.8 6.7 SCCS-vsn: usr.sbin/chown/chown.8 6.5 SCCS-vsn: usr.sbin/chroot/chroot.8 5.3 SCCS-vsn: usr.sbin/config/config.8 6.5 SCCS-vsn: usr.sbin/diskpart/diskpart.8 6.6 SCCS-vsn: old/dlmpcc/dlmpcc.8 6.5 SCCS-vsn: old/gettable/gettable.8 6.5 SCCS-vsn: old/htable/htable.8 6.6 SCCS-vsn: old/implog/implog.8 6.7 SCCS-vsn: old/implogd/implogd.8 6.7 SCCS-vsn: usr.sbin/inetd/inetd.8 6.7 SCCS-vsn: usr.sbin/kgmon/kgmon.8 6.4 SCCS-vsn: usr.sbin/kvm_mkdb/kvm_mkdb.8 5.2 SCCS-vsn: usr.sbin/lpr/lpc/lpc.8 6.4 SCCS-vsn: usr.sbin/lpr/lpd/lpd.8 6.6 SCCS-vsn: usr.sbin/lpr/pac/pac.8 6.5 SCCS-vsn: usr.sbin/mkproto/mkproto.8 6.3 SCCS-vsn: usr.sbin/portmap/portmap.8 5.3 SCCS-vsn: usr.sbin/quotaon/quotaon.8 6.7 SCCS-vsn: usr.sbin/repquota/repquota.8 6.6 SCCS-vsn: usr.sbin/rmt/rmt.8 6.5 SCCS-vsn: usr.sbin/rwhod/rwhod.8 6.5 SCCS-vsn: old/rxformat/rxformat.8 6.6 SCCS-vsn: usr.sbin/sendmail/src/sendmail.8 6.5 SCCS-vsn: usr.sbin/sliplogin/sliplogin.8 5.3 SCCS-vsn: usr.sbin/syslogd/syslogd.8 6.10 SCCS-vsn: usr.sbin/timed/timedc/timedc.8 6.6 SCCS-vsn: usr.sbin/traceroute/traceroute.8 5.4 SCCS-vsn: usr.sbin/trpt/trpt.8 6.5 SCCS-vsn: usr.sbin/trsp/trsp.8 6.4 SCCS-vsn: usr.sbin/update/update.8 6.3 SCCS-vsn: usr.sbin/vipw/vipw.8 6.7 --- usr/src/old/arff/arff.8 | 142 ++--- usr/src/old/dlmpcc/dlmpcc.8 | 117 +++-- usr/src/old/gettable/gettable.8 | 97 ++-- usr/src/old/htable/htable.8 | 151 +++--- usr/src/old/implog/implog.8 | 97 ++-- usr/src/old/implogd/implogd.8 | 69 ++- usr/src/old/rxformat/rxformat.8 | 82 +-- usr/src/share/man/man8/adduser.8 | 102 ++-- usr/src/share/man/man8/intro.8 | 51 +- usr/src/share/man/man8/makedev.8 | 101 ++-- usr/src/share/man/man8/man8.hp300/crash.8 | 183 +++---- usr/src/share/man/man8/man8.hp300/format.8 | 42 +- usr/src/share/man/man8/man8.vax/drtest.8 | 112 ++-- usr/src/share/man/man8/man8.vax/installboot.8 | 75 +-- usr/src/share/man/man8/rc.8 | 94 ++-- usr/src/share/man/man8/sticky.8 | 81 +-- usr/src/usr.bin/renice/renice.8 | 120 +++-- usr/src/usr.bin/showmount/showmount.8 | 86 +-- usr/src/usr.bin/uucp/uucico/uucico.8 | 393 +++++++------- usr/src/usr.bin/uucp/uuclean/uuclean.8 | 97 ++-- usr/src/usr.bin/uucp/uupoll/uupoll.8 | 118 +++-- usr/src/usr.bin/uucp/uusnap/uusnap.8 | 70 ++- usr/src/usr.bin/uucp/uuxqt/uuxqt.8 | 105 ++-- usr/src/usr.sbin/ac/ac.8 | 140 ++--- usr/src/usr.sbin/amd/amd/amd.8 | 293 ++++++----- usr/src/usr.sbin/amd/amq/amq.8 | 124 +++-- usr/src/usr.sbin/arp/arp.8 | 163 +++--- usr/src/usr.sbin/bad144/bad144.8 | 205 ++++---- usr/src/usr.sbin/chown/chown.8 | 81 +-- usr/src/usr.sbin/chroot/chroot.8 | 68 ++- usr/src/usr.sbin/config/config.8 | 182 ++++--- usr/src/usr.sbin/diskpart/diskpart.8 | 144 ++--- usr/src/usr.sbin/inetd/inetd.8 | 213 +++++--- usr/src/usr.sbin/kgmon/kgmon.8 | 109 ++-- usr/src/usr.sbin/kvm_mkdb/kvm_mkdb.8 | 67 +-- usr/src/usr.sbin/lpr/lpc/lpc.8 | 188 +++---- usr/src/usr.sbin/lpr/lpd/lpd.8 | 262 +++++----- usr/src/usr.sbin/lpr/pac/pac.8 | 127 +++-- usr/src/usr.sbin/mkproto/mkproto.8 | 99 ++-- usr/src/usr.sbin/portmap/portmap.8 | 94 ++-- usr/src/usr.sbin/quotaon/quotaon.8 | 189 ++++--- usr/src/usr.sbin/repquota/repquota.8 | 117 +++-- usr/src/usr.sbin/rmt/rmt.8 | 200 ++++--- usr/src/usr.sbin/rwhod/rwhod.8 | 94 ++-- usr/src/usr.sbin/sendmail/src/sendmail.8 | 490 +++++++++--------- usr/src/usr.sbin/sliplogin/sliplogin.8 | 205 ++++---- usr/src/usr.sbin/syslogd/syslogd.8 | 122 +++-- usr/src/usr.sbin/timed/timedc/timedc.8 | 146 +++--- usr/src/usr.sbin/traceroute/traceroute.8 | 353 +++++++------ usr/src/usr.sbin/trpt/trpt.8 | 151 +++--- usr/src/usr.sbin/trsp/trsp.8 | 141 ++--- usr/src/usr.sbin/update/update.8 | 83 +-- usr/src/usr.sbin/vipw/vipw.8 | 110 ++-- 53 files changed, 4199 insertions(+), 3346 deletions(-) diff --git a/usr/src/old/arff/arff.8 b/usr/src/old/arff/arff.8 index 87f1b8f085..25ca73be5d 100644 --- a/usr/src/old/arff/arff.8 +++ b/usr/src/old/arff/arff.8 @@ -1,26 +1,34 @@ -.\" Copyright (c) 1980 Regents of the University of California. -.\" All rights reserved. The Berkeley software License Agreement -.\" specifies the terms and conditions for redistribution. +.\" Copyright (c) 1980, 1991 Regents of the University of California. +.\" All rights reserved. .\" -.\" @(#)arff.8 6.4 (Berkeley) %G% +.\" %sccs.include.redist.man% .\" -.TH ARFF 8 "" -.UC 4 -.SH NAME -arff \- floppy archiver -.SH SYNOPSIS -.B arff -[ key ] [ name ... ] -.SH DESCRIPTION -.I Arff +.\" @(#)arff.8 6.5 (Berkeley) %G% +.\" +.Dd +.Dt ARFF 8 +.Os BSD 4 +.Sh NAME +.Nm arff +.Nd floppy archiver +.Sh SYNOPSIS +.Nm arff +.Op Ar key +.Op Ar name Ar ... +.Sh DESCRIPTION +.Nm Arff saves and restores files -on VAX console media (the console floppy on the VAX 11/780 and 785, +on +.Tn VAX +console media (the console floppy on the +.Tn VAX +11/780 and 785, the cassette on the 11/730, and the console RL02 on the 8600/8650). Its actions are controlled by the -.I key +.Ar key argument. The -.I key +.Ar key is a string of characters containing at most one function letter and possibly one or more function modifiers. @@ -28,76 +36,88 @@ Other arguments to the command are file names specifying which files are to be dumped or restored. The default options are correct for the RX01 floppy on the 780; for other console media, the -.B f +.Fl f and -.B m +.Fl m flags are required. -.PP +.Pp Files names have restrictions, because of radix50 considerations. They -must be in the form 1-6 alphanumerics followed by "." followed by +must be in the form 1-6 alphanumerics followed by +.Ql \&. +followed by 0-3 alphanumerics. Case distinctions are lost. Only the trailing component of a pathname is used. -.PP +.Pp The function portion of the key is specified by one of the following letters: -.TP 8 -.B r +.Bl -tag -width Ds +.It Fl d +The named files are deleted from the floppy. Arff will combine contiguous +deleted files into one empty entry in the rt-11 directory. +.It Fl r The named files are replaced where found on the floppy, or added taking up the minimal possible portion of the first empty spot on the floppy. -.TP 8 -.B x -The named files are extracted from the floppy. -.TP 8 -.B d -The named files are deleted from the floppy. Arff will combine contiguous -deleted files into one empty entry in the rt-11 directory. -.TP 8 -.B t +.It Fl t The names of the specified files are listed each time they occur on the floppy. If no file argument is given, all of the names on the floppy are listed. -.PP +.It Fl x +The named files are extracted from the floppy. +.El +.Pp The following characters may be used in addition to the letter which selects the function desired. -.TP 10 -.B v -The -.B v -(verbose) -option, when used with the -.B t -function gives more information about the -floppy entries than just the name. -.TP 10 -.B f +.Bl -tag -width Ds +.It Fl c +causes +.Nm arff +to create a new directory on the floppy, effectively deleting +all previously existing files. +.It Fl f causes -.I arff +.Nm arff to use the next argument as the name of the archive instead -of /dev/floppy. -.TP 10 -.B m +of +.Pa /dev/floppy . +.It Fl m causes -.I arff +.Nm arff not to use the mapping algorithm employed in interleaving sectors around a floppy disk. In conjunction with the -.B f +.Fl f option it may be used for extracting files from rt11 formatted cartridge disks, for example. It may also be used to speed up reading from and writing to rx02 floppy disks, by using the `c' device instead of the `b' device. It must be used with TU58 or RL02 media. -.TP 10 -.B c -causes -.I arff -to create a new directory on the floppy, effectively deleting -all previously existing files. -.SH FILES -/dev/floppy default floppy device -.SH SEE ALSO -crl(4), fl(4), rx(4), tu(4), floppy(8), rxformat(8) -.SH BUGS +.It Fl v +The +.Fl v +(verbose) +option, when used with the +.Fl t +function gives more information about the +floppy entries than just the name. +.El +.Sh FILES +.Bl -tag -width /dev/floppyxxx -compact +.It Pa /dev/floppy +default floppy device +.El +.Sh SEE ALSO +.Xr crl 4 , +.Xr fl 4 , +.Xr rx 4 , +.Xr tu 4 , +.Xr floppy 8 , +.Xr rxformat 8 +.Sh BUGS Device errors are handled ungracefully. +.Sh HISTORY +The +.Nm +command appeared in +.Bx 4.0 . diff --git a/usr/src/old/dlmpcc/dlmpcc.8 b/usr/src/old/dlmpcc/dlmpcc.8 index 829d50bf48..f242ef3674 100644 --- a/usr/src/old/dlmpcc/dlmpcc.8 +++ b/usr/src/old/dlmpcc/dlmpcc.8 @@ -1,54 +1,87 @@ -.\" Copyright (c) 1987 The Regents of the University of California. +.\" Copyright (c) 1987, 1991 The Regents of the University of California. .\" All rights reserved. .\" .\" This code is derived from software contributed to Berkeley by .\" Computer Consoles Inc. -.\" .\" %sccs.include.redist.man% .\" -.\" @(#)dlmpcc.8 6.4 (Berkeley) %G% +.\" @(#)dlmpcc.8 6.5 (Berkeley) %G% .\" -.TH DLMPCC 8 "" -.UC 7 -.SH NAME -dlmpcc \- download MPCC -.SH SYNOPSIS -\fBdlmpcc\fR [ n ] -.SH DESCRIPTION -\fIDlmpcc\fR downloads CCI's Multi-Protocol -Communication Controller (MPCC). +.Dd +.Dt DLMPCC 8 +.Os +.Sh NAME +.Nm dlmpcc +.Nd download +MPCC +.Sh SYNOPSIS +.Nm dlmpcc +.Op n +.Sh DESCRIPTION +.Nm Dlmpcc +downloads +.Tn CCI's +Multi-Protocol +Communication Controller +.Pq Tn MPCC . The controller provides high-speed -synchronous communications for the \s-1POWER 5\s+1 and \s-1POWER 6\s+1 families of computers. +synchronous communications for the +.Tn POWER +5 and +.Tn POWER +6 families of computers. This utility allows you to -download any or all of the MPCC boards. -The configuration file \fBmpcctab\fR determines -the protocol attributes for each MPCC board. See -\fImpcctab\fR(4) for details. -.LP -If you specify the command with no argument, then \fIdlmpcc\fR -scans the configuration file and downloads all configured boards -with corresponding protocol software. The -option \fIn\fR allows you to specify one or -more MPCC boards for downloading. The valid values range from -\fB0-15\fR. For example, the following command line orders \fIdlmpcc\fR +download any or all of the +.Tn MPCC +boards. +The configuration file +.Pa mpcctab +determines +the protocol attributes for each +.Tn MPCC +board. See +.Xr mpcctab 4 +for details. +.Pp +If you specify the command with no argument, then +.Xr dlmpcc +scans the configuration file +.Pa mpcctab +and downloads all configured boards +with corresponding protocol software. +.Pp +Available option: +.Pp +.Bl -tag -width Ds +.It Ar n +Specify one or +more +.Tn MPCC +boards for downloading. The valid values range from +.Sy 0-15 . +For example, the following command line orders +.Nm dlmpcc to download only the protocol software identified with board 2: -.nf - - dlmpcc 2 - -.fi -The next command line orders the download -of the protocols identified with +.Pp +.Dl dlmpcc 2 +.Pp +The next command line orders the download of the protocols identified with boards 0 and 3: -.nf - - dlmpcc 0 3 -.fi -.LP +.Pp +.Dl dlmpcc 0 3 +.El +.Pp Typically, this download function is performed at boot time from the -/etc/rc.local file with an entry similar to: -.nf - /usr/sbin/dlmpcc > /dev/console 2>&1 -.fi -.SH SEE ALSO -mpcctab(4) +.Pa /etc/rc.local +file with an entry similar to: +.Bd -literal -offset indent +/usr/sbin/dlmpcc > /dev/console 2>&1 +.Ed +.Sh SEE ALSO +.Xr mpcctab 4 +.Xr rc 8 +.Sh HISTORY +The +.Nm +command appeared in +.Bx 4.3 tahoe . diff --git a/usr/src/old/gettable/gettable.8 b/usr/src/old/gettable/gettable.8 index be5516e20c..9373032ede 100644 --- a/usr/src/old/gettable/gettable.8 +++ b/usr/src/old/gettable/gettable.8 @@ -1,55 +1,76 @@ -.\" Copyright (c) 1983 The Regents of the University of California. +.\" Copyright (c) 1983, 1991 The Regents of the University of California. .\" All rights reserved. .\" .\" %sccs.include.redist.man% .\" -.\" @(#)gettable.8 6.4 (Berkeley) %G% +.\" @(#)gettable.8 6.5 (Berkeley) %G% .\" -.TH GETTABLE 8 "" -.UC 5 -.SH NAME -gettable \- get NIC format host tables from a host -.SH SYNOPSIS -.B gettable -[ -.B \-v -] -.I host -[ outfile ] -.SH DESCRIPTION -.I Gettable -is a simple program used to obtain the NIC standard -host tables from a ``nicname'' server. The indicated -.I host +.Dd +.Dt GETTABLE 8 +.Os BSD 4.2 +.Sh NAME +.Nm gettable +.Nd get +.Tn NIC +format host tables from a host +.Sh SYNOPSIS +.Nm gettable +.Op Fl v +.Ar host +.Op Ar outfile +.Sh DESCRIPTION +.Nm Gettable +is a simple program used to obtain the +.Tn NIC +standard +host tables from a +.Dq nicname +server. The indicated +.Ar host is queried for the tables. The tables, if retrieved, are placed in the file -.I outfile +.Ar outfile or by default, -.IR hosts.txt . -.PP -The -.B \-v -option will get just the version number instead of the complete host table +.Pa hosts.txt . +.Pp +Available option: +.Bl -tag -width Ds +.It Fl v +Get just the version number instead of the complete host table and put the output in the file -.I outfile +.Ar outfile or by default, -.IR hosts.ver . -.PP -.I Gettable -operates by opening a TCP connection to the port indicated +.Pa hosts.ver . +.El +.Pp +.Nm Gettable +operates by opening a +.Tn TCP +connection to the port indicated in the service specification for ``nicname''. A request -is then made for ``ALL'' names and the resultant information +is then made for +.Dq ALL +names and the resultant information is placed in the output file. -.PP -.I Gettable +.Pp +.Nm Gettable is best used in conjunction with the -.IR htable (8) -program which converts the NIC standard file format to +.Xr htable 8 +program which converts the +.Tn NIC +standard file format to that used by the network library lookup routines. -.SH "SEE ALSO" -intro(3), htable(8), named(8) -.SH BUGS +.Sh SEE ALSO +.Xr intro 3 , +.Xr htable 8 , +.Xr named 8 +.Sh BUGS If the name-domain system provided network name mapping well as host name mapping, -.I gettable +.Nm gettable would no longer be needed. +.Sh HISTORY +The +.Nm +command appeared in +.Bx 4.2 . diff --git a/usr/src/old/htable/htable.8 b/usr/src/old/htable/htable.8 index 740131ac2f..3b0cb8296a 100644 --- a/usr/src/old/htable/htable.8 +++ b/usr/src/old/htable/htable.8 @@ -1,106 +1,123 @@ -.\" Copyright (c) 1983 The Regents of the University of California. +.\" Copyright (c) 1983, 1991 The Regents of the University of California. .\" All rights reserved. .\" .\" %sccs.include.redist.man% .\" -.\" @(#)htable.8 6.5 (Berkeley) %G% +.\" @(#)htable.8 6.6 (Berkeley) %G% .\" -.TH HTABLE 8 "" -.UC 5 -.SH NAME -htable \- convert NIC standard format host tables -.SH SYNOPSIS -.B htable -[ -.B \-c -.I connected-nets -] [ -.B \-l -.I local-nets -] -.I file -.SH DESCRIPTION -.I Htable +.Dd +.Dt HTABLE 8 +.Os BSD 4.2 +.Sh NAME +.Nm htable +.Nd convert +.Tn NIC +standard format host tables +.Sh SYNOPSIS +.Nm htable +.Op Fl c Ar connected-nets +.Op Fl l Ar local-nets +.Ar file +.Sh DESCRIPTION +.Nm Htable is used to convert host files in the format specified -in Internet RFC 810 to the format used by the network +in Internet +.Tn RFC +810 to the format used by the network library routines. Three files are created as a result of running -.IR htable : -.IR hosts , -.IR networks , +.Nm htable : +.Pa hosts , +.Pa networks , and -.IR gateways . +.Pa gateways . The -.I hosts +.Xr hosts file may be used by the -.IR gethostbyname (3N) +.Xr gethostbyname 3 routines in mapping host names to addresses if the nameserver, -.IR named (8), +.Xr named 8 , is not used. The -.I networks +.Pa networks file is used by the -.IR getnetent (3N) +.Xr getnetent 3 routines in mapping network names to numbers. The -.I gateways +.Pa gateways file may be used by the routing daemon -in identifying ``passive'' Internet gateways; +in identifying +.Dq passive +Internet gateways; see -.IR routed (8C) +.Xr routed 8 for an explanation. -.PP -If any of the files -.IR localhosts , -.IR localnetworks , -or -.I localgateways -are present in the current directory, -the file's contents is prepended to the -output file. -Of these, only the gateways file is interpreted. -This allows sites to maintain local aliases and -entries which are not normally present in the -master database. -Only one gateway to each network will be placed in the gateways file; -a gateway listed in the localgateways file will override any in the -input file. -.PP +.Pp +Options available for +.Nm htable : +.Bl -tag -width Ds +.It Fl c Ar connected-nets If the gateways file is to be used, -a list of networks to which the host is directly connected -is specified with the -.B \-c -flag. +.Ar connected-nets +is a list of networks to which the host is directly connected. The networks, separated by commas, may be given by name or in Internet-standard dot notation, -e.g. -.B \-c -arpanet,128.32,local-ether-net. -.I Htable +for example: +.Bd -literal -offset indent +\-c arpanet,128.32,local-ether-net. +.Ed +.Pp +.Nm Htable only includes gateways which are directly connected to one of the networks specified, or which can be reached from another gateway on a connected net. -.PP +.It Fl l Ar local-nets If the -.B \-l +.Fl l option is given with a list of networks (in the same format as for -.BR \-c ), +.Fl c ) , these networks will be treated as ``local,'' and information about hosts on local networks is taken only from the localhosts file. Entries for local hosts from the main database will be omitted. This allows the localhosts file to completely override any entries in the input file. -.PP -.I Htable +.El +.Pp +If any of the files +.Pa localhosts , +.Pa localnetworks , +or +.Pa localgateways +are present in the current directory, +the file's contents is prepended to the +output file. +Of these, only the gateways file is interpreted. +This allows sites to maintain local aliases and +entries which are not normally present in the +master database. +Only one gateway to each network will be placed in the gateways file; +a gateway listed in the localgateways file will override any in the +input file. +.Pp +.Nm Htable is best used in conjunction with the -.IR gettable (8) -program which retrieves the NIC database from a host. -.SH "SEE ALSO" -netintro(4), gettable(8), named(8) -.SH BUGS +.Xr gettable 8 +program which retrieves the +.Tn NIC +database from a host. +.Sh SEE ALSO +.Xr netintro 4 , +.Xr gettable 8 , +.Xr named 8 +.Sh BUGS If the name-domain system provided network name mapping well as host name mapping, -.I htable +.Nm htable would no longer be needed. +.Sh HISTORY +The +.Nm +command appeared in +.Bx 4.2 . diff --git a/usr/src/old/implog/implog.8 b/usr/src/old/implog/implog.8 index 9f1da4dd38..3aac87b006 100644 --- a/usr/src/old/implog/implog.8 +++ b/usr/src/old/implog/implog.8 @@ -1,81 +1,72 @@ -.\" Copyright (c) 1983 The Regents of the University of California. +.\" Copyright (c) 1983, 1991 The Regents of the University of California. .\" All rights reserved. .\" .\" %sccs.include.redist.man% .\" -.\" @(#)implog.8 6.6 (Berkeley) %G% +.\" @(#)implog.8 6.7 (Berkeley) %G% .\" -.TH IMPLOG 8 "" -.UC 5 -.SH NAME -implog \- IMP log interpreter -.SH SYNOPSIS -.B implog -[ -.B \-DFLcfr -] [ -.B \-h -.I host# -] [ -.B \-i -.I imp# -] [ -.B \-l -.I link -] [ -.B \-t -.I message-type -] -.SH DESCRIPTION -.I Implog +.Dd +.Dt IMPLOG 8 +.Os BSD 4.2 +.Sh NAME +.Nm implog +.Nd +.Tn IMP +log interpreter +.Sh SYNOPSIS +.Nm implog +.Op Fl DFLcfr +.Op Fl h Ar host# +.Op Fl i Ar imp# +.Op Fl l Ar link +.Op Fl t Ar message-type +.Sh DESCRIPTION +.Nm Implog is program which interprets the message log produced by -.IR implogd (8). -.PP +.Xr implogd 8 . +.Pp If no arguments are specified, -.I implog +.Nm implog interprets and prints every message present in the message file. Options may be specified to force printing only a subset of the logged messages. -.TP -.B \-D +.Bl -tag -width Ds +.It Fl D Do not show data messages. -.TP -.B \-F +.It Fl F Follow the logging process in action. This flag causes -.I implog +.Nm implog to check for, and display, new logged messages every 5 seconds. -.TP -.B \-L +.It Fl L Show only those messages received on the link number of the IP protocol. -.TP -.B \-c +.It Fl c In addition to printing any data messages logged, show the contents of the data in hexadecimal bytes. -.TP -.B \-f +.It Fl f Follow the logging process in action as with -.B \-F , +.Fl F , but print the current contents of the log file first. -.TP -.B \-h +.It Fl h Show only those messages received from the specified host. (Usually specified in conjunction with an imp.) -.TP -.B \-i +.It Fl i Show only those messages received from the specified imp. -.TP -.B \-l +.It Fl l Show only those messages received on the specified ``link''. -.TP -.B \-r +.It Fl r Print the raw imp leader, showing all fields, in addition to the formatted interpretation according to type. -.TP -.B \-t +.It Fl t Show only those messages received of the specified message type. -.SH "SEE ALSO" -imp(4), implogd(8) -.SH BUGS +.Sh SEE ALSO +.Xr imp 4 , +.Xr implogd 8 +.Sh BUGS Cannot specify multiple hosts, imps, etc. +.Sh HISTORY +The +.Nm +command appeared in +.Bx 4.2 . diff --git a/usr/src/old/implogd/implogd.8 b/usr/src/old/implogd/implogd.8 index 4d805736d2..2bb4561e36 100644 --- a/usr/src/old/implogd/implogd.8 +++ b/usr/src/old/implogd/implogd.8 @@ -1,27 +1,30 @@ -.\" Copyright (c) 1983 The Regents of the University of California. +.\" Copyright (c) 1983, 1991 The Regents of the University of California. .\" All rights reserved. .\" .\" %sccs.include.redist.man% .\" -.\" @(#)implogd.8 6.6 (Berkeley) %G% +.\" @(#)implogd.8 6.7 (Berkeley) %G% .\" -.TH IMPLOGD 8 "" -.UC 5 -.SH NAME -implogd \- IMP logger process -.SH SYNOPSIS -.B implogd -.SH DESCRIPTION -.I Implogd -is program which logs error messages from the IMP, +.Dd +.Dt IMPLOGD 8 +.Os BSD 4.2 +.Sh NAME +.Nm implogd +.Nd +.Tn IMP +logger process +.Sh SYNOPSIS +.Nm implogd +.Sh DESCRIPTION +.Nm Implogd +is program which logs error messages from an +.Tn IMP , placing them in the file -.IR /var/log/implog . -.PP +.Pa /var/log/implog . +.Pp Entries in the file are variable length. Each log entry has a fixed length header of the form: -.PP -.ta 0.5i 1.0i 1.5i -.nf +.Bd -literal -offset indent struct sockstamp { short sin_family; u_short sin_port; @@ -29,18 +32,32 @@ struct sockstamp { time_t sin_time; int sin_len; }; -.fi -.PP -followed, possibly, by the message received from the IMP. +.Ed +.Pp +followed, possibly, by the message received from the +.Tn IMP . Each time the logging process is started up it places a time stamp entry in the file (a header with -.I sin_len +.Ar sin_len field set to 0). -.PP -The logging process will catch only those message from the IMP +.Pp +The logging process will catch only those messages from the +.Tn IMP which are not processed by a protocol module, e.g. IP. This implies the log should contain only status information such -as ``IMP going down'' messages, ``host down'' and other error messages, -and, perhaps, stray NCP messages. -.SH "SEE ALSO" -imp(4), implog(8) +as +.Dq Tn IMP No going down +messages, +.Dq host down +and other error messages, +and, perhaps, stray +.Tn NCP +messages. +.Sh SEE ALSO +.Xr imp 4 , +.Xr implog 8 +.Sh HISTORY +The +.Nm +command appeared in +.Bx 4.2 . diff --git a/usr/src/old/rxformat/rxformat.8 b/usr/src/old/rxformat/rxformat.8 index 760052b6dc..90dd187a3f 100644 --- a/usr/src/old/rxformat/rxformat.8 +++ b/usr/src/old/rxformat/rxformat.8 @@ -1,58 +1,76 @@ -.\" Copyright (c) 1983 The Regents of the University of California. +.\" Copyright (c) 1983, 1991 The Regents of the University of California. .\" All rights reserved. .\" .\" %sccs.include.redist.man% .\" -.\" @(#)rxformat.8 6.5 (Berkeley) %G% +.\" @(#)rxformat.8 6.6 (Berkeley) %G% .\" -.TH RXFORMAT 8 "" -.UC 5 -.SH NAME -rxformat \- format floppy disks -.SH SYNOPSIS -.B rxformat -[ -.B \-d -] special -.SH DESCRIPTION +.Dd +.Dt RXFORMAT 8 +.Os BSD 4.2 +.Sh NAME +.Nm rxformat +.Nd format floppy disks +.Sh SYNOPSIS +.Nm rxformat +.Op Fl d +.Ar special +.Sh DESCRIPTION The -.I rxformat +.Nm rxformat program formats a diskette in the specified drive associated with the special device -.IR special . -( -.I Special -is normally /dev/rx0, for drive 0, or /dev/rx1, +.Ar special . +.Pf ( Ar Special +is normally +.Pa /dev/rx0 , +for drive 0, or +.Pa /dev/rx1 , for drive 1.) +.Pp +Available option: +.Bl -tag -width Ds +.It Fl d +Force double density formatting. By default, the diskette is formatted single density; -a -.B \-d -flag may be supplied to force double density formatting. Single density is compatible -with the IBM 3740 standard (128 bytes/sector). +with the +.Tn IBM +3740 standard (128 bytes/sector). In double density, each sector contains 256 bytes of data. -.PP +.El +.Pp Before formatting a diskette -.I rxformat +.Nm rxformat prompts for verification if standard input is a tty (this allows a user to cleanly abort the operation; note that formatting a diskette will destroy any existing data). Formatting is done by the hardware. All sectors are zero-filled. -.SH DIAGNOSTICS -`No such device' means that the drive is not ready, +.Sh DIAGNOSTICS +.Bl -tag -width Ds +.It Sy \&No such device +means that the drive is not ready, usually because no disk is in the drive or the drive door is open. Other error messages are selfexplanatory. -.SH FILES -/dev/rx? -.SH SEE ALSO -rx(4) -.SH AUTHOR +.El +.Sh FILES +.Bl -tag -width /dev/rx? -compact +.It Pa /dev/rx? +.El +.Sh SEE ALSO +.Xr rx 4 +.Sh AUTHOR Helge Skrivervik -.SH BUGS +.Sh BUGS A floppy may not be formatted if the header info on sector 1, track 0 has been damaged. Hence, it is not possible to format a completely degaussed disk. -(This is actually a problem in the hardware.) +(This is actually a problem in the DEC hardware.) +.Sh HISTORY +The +.Nm +command appeared in +.Bx 4.2 . diff --git a/usr/src/share/man/man8/adduser.8 b/usr/src/share/man/man8/adduser.8 index 22dc69c384..c39a417a22 100644 --- a/usr/src/share/man/man8/adduser.8 +++ b/usr/src/share/man/man8/adduser.8 @@ -1,61 +1,89 @@ -.\" Copyright (c) 1980 The Regents of the University of California. +.\" Copyright (c) 1980, 1991 The Regents of the University of California. .\" All rights reserved. .\" .\" %sccs.include.redist.man% .\" -.\" @(#)adduser.8 6.7 (Berkeley) %G% +.\" @(#)adduser.8 6.8 (Berkeley) %G% .\" -.TH ADDUSER 8 "" -.UC 4 -.SH NAME -adduser \- procedure for adding new users -.SH DESCRIPTION +.Dd +.Dt ADDUSER 8 +.Os BSD 4 +.Sh NAME +.Nm adduser +.Nd procedure for adding new users +.Sh DESCRIPTION A new user must choose a login name, which must not already appear in -.IR /etc/passwd or -.IR /etc/aliases . -It must also not begin with the hyphen (``-'') character. +.Pa /etc/passwd +or +.Pa /etc/aliases . +It must also not begin with the hyphen +.Ql Fl +character. It is strongly recommended that it be all lower-case, and not contain -the dot (``.'') character, as that tends to confuse mailers. +the dot +.Ql \&. +character, as that tends to confuse mailers. An account can be added by editing a line into the passwd file; this must be done with the password file locked e.g. by using -.IR chpass (1) +.Xr chpass 1 or -.IR vipw (8). -.PP +.Xr vipw 8 . +.Pp A new user is given a group and user id. -Login's and user id's should be unique across the system, and often across +Login and user id's should be unique across the system, and often across a group of systems, since they are used to control file access. Typically, users working on similar projects will be put in the same groups. At the University of California, Berkeley, we have groups for system staff, faculty, graduate students, and special groups for large projects. -.PP -A skeletal account for a new user \*(lqernie\*(rq might look like: -.IP -ernie::25:30::0:0:Ernie Kovacs,508 Evans Hall,x7925,642-8202:/a/users/ernie:/bin/csh -.PP +.Pp +A skeletal account for a new user +\*(lqernie\*(rq +might look like: +.Bd -literal +ernie::25:30::0:0:Ernie Kovacs,508 Evans Hall,x7925, + 642-8202:/a/users/ernie:/bin/csh +.Ed +.Pp For a description of each of these fields, see -.IR passwd (5). -.PP +.Xr passwd 5 . +.Pp It is useful to give new users some help in getting started, supplying them with a few skeletal files such as -.I \&.profile -if they use \*(lq/bin/sh\*(rq, or -.I \&.cshrc +.Pa \&.profile +if they use +.Pa /bin/sh , +or +.Pa \&.cshrc and -.I \&.login -if they use \*(lq/bin/csh\*(rq. +.Pa \&.login +if they use +.Pa /bin/csh . The directory -\*(lq/usr/share/skel\*(rq contains skeletal definitions of such files. +.Pa /usr/share/skel +contains skeletal definitions of such files. New users should be given copies of these files which, for instance, use -.IR tset (1) +.Xr tset 1 automatically at each login. -.SH FILES -.ta 2i -/etc/master.passwd user database -.br -/usr/share/skel skeletal login directory -.SH SEE ALSO -chpass(1), finger(1), passwd(1), aliases(5), passwd(5), mkpasswd(8), vipw(8) -.SH BUGS +.Sh FILES +.Bl -tag -width /etc/master.passwdxx -compact +.It Pa /etc/master.passwd +user database +.It Pa /usr/share/skel +skeletal login directory +.El +.Sh SEE ALSO +.Xr chpass 1 , +.Xr finger 1 , +.Xr passwd 1 , +.Xr aliases 5 , +.Xr passwd 5 , +.Xr pwd_mkdb 8 , +.Xr vipw 8 +.Sh BUGS User information should (and eventually will) be stored elsewhere. +.Sh HISTORY +The +.Nm +command appeared in +.Bx 3.0 . diff --git a/usr/src/share/man/man8/intro.8 b/usr/src/share/man/man8/intro.8 index e7988b7fab..1d017c2d50 100644 --- a/usr/src/share/man/man8/intro.8 +++ b/usr/src/share/man/man8/intro.8 @@ -1,31 +1,44 @@ -.\" Copyright (c) 1983 Regents of the University of California. -.\" All rights reserved. The Berkeley software License Agreement -.\" specifies the terms and conditions for redistribution. +.\" Copyright (c) 1983, 1991 Regents of the University of California. +.\" All rights reserved. .\" -.\" @(#)intro.8 6.3 (Berkeley) %G% +.\" %sccs.include.redist.man% .\" -.TH INTRO 8 "" -.UC 5 -.SH NAME -intro \- introduction to system maintenance and operation commands -.SH DESCRIPTION +.\" @(#)intro.8 6.4 (Berkeley) %G% +.\" +.Dd +.Dt INTRO 8 +.Os BSD 4.2 +.Sh NAME +.Nm intro +.Nd "introduction to system maintenance and operation commands" +.Sh DESCRIPTION This section contains information related to system operation and maintenance. It describes commands used to create new file systems, -.IR newfs , +.Ql Xr newfs , verify the integrity of the file systems, -.IR fsck , +.Ql Xr fsck , control disk usage, -.IR edquota , +.Ql Xr edquota , maintain system backups, -.IR dump , +.Ql Xr dump , and recover files when disks die an untimely death, -.IR restore . -The section -.I format -should be consulted when formatting disk packs. -Network related services are distinguished as 8C. +.Ql Xr restore . +The manual +.Ql Xr format +should be consulted when formatting disk packs respective +to the architecture the system is running on. +Network related services like +.Ql Xr inetd +and +.Ql Xr ftpd +are also described. The section -.I crash +.Ql Xr crash should be consulted in understanding how to interpret system crash dumps. +.Sh HISTORY +The +.Nm +command appeared in +.Bx 4.2 . diff --git a/usr/src/share/man/man8/makedev.8 b/usr/src/share/man/man8/makedev.8 index 9eb66ef11d..8e8e027301 100644 --- a/usr/src/share/man/man8/makedev.8 +++ b/usr/src/share/man/man8/makedev.8 @@ -1,57 +1,84 @@ -.\" Copyright (c) 1983 Regents of the University of California. -.\" All rights reserved. The Berkeley software License Agreement -.\" specifies the terms and conditions for redistribution. +.\" Copyright (c) 1983, 1991 Regents of the University of California. +.\" All rights reserved. .\" -.\" @(#)makedev.8 6.2 (Berkeley) %G% +.\" %sccs.include.redist.man% .\" -.TH MAKEDEV 8 "" -.UC 5 -.SH NAME -makedev \- make system special files -.SH SYNOPSIS -.B /dev/MAKEDEV -.IR device ... -.SH DESCRIPTION -.I MAKEDEV +.\" @(#)makedev.8 6.3 (Berkeley) %G% +.\" +.Dd +.Dt MAKEDEV 8 +.Os BSD 4.2 +.Sh NAME +.Nm makedev +.Nd make system special files +.Sh SYNOPSIS +.Nm MAKEDEV +.Ar device ... +.Sh DESCRIPTION +.Nm MAKEDEV is a shell script normally used to install special files. It resides in the -.I /dev +.Pa /dev directory, as this is the normal location of special files. Arguments to -.I MAKEDEV +.Nm MAKEDEV are usually of the form -.IR device-name ? +.Ar device-name Ns Sy \&? where -.I device-name +.Ar device-name is one of the supported devices listed in section 4 of the -manual and ``?'' is a logical unit number (0-9). A few +manual and +.Dq Sy \&? +is a logical unit number (0-9). A few special arguments create assorted collections of devices and are listed below. -.TP -.B std +.Bl -tag -width Ds +.It Sy std Create the -.I standard -devices for the system; e.g. /dev/console, /dev/tty. -The VAX-11/780 console floppy device, /dev/floppy, and VAX-11/750 -and VAX-11/730 console cassette device(s), /dev/tu?, are also -created with this entry. -.TP -.B local +.Em standard +devices for the system; for example the standard +.Tn UNIX +devices +.Pa /dev/console and /dev/tty; +the standard hardware dependent devices, +for example in the VAX family +the +.Tn VAX-11/780 +console floppy device, +.Pa /dev/floppy , +and +.Tn VAX-11/750 +and +.Tn VAX-11/730 +console cassette device(s), +.Pa /dev/tu? +devices would be made for the appropriate system. +.It Sy local Create those devices specific to the local site. This request causes the shell file -.I /dev/MAKEDEV.local +.Pa /dev/MAKEDEV.local to be executed. Site specific commands, such as those -used to setup dialup lines as ``ttyd?'' should be included +used to setup dialup lines as +.Pa ttyd? +should be included in this file. -.PP +.El +.Pp Since all devices are created using -.IR mknod (8), +.Xr mknod 8 , this shell script is useful only to the super-user. -.SH DIAGNOSTICS +.Sh DIAGNOSTICS Either self-explanatory, or generated by one of the programs -called from the script. Use ``sh -x MAKEDEV'' in case of +called from the script. Use +.Ql sh -x MAKEDEV +in case of trouble. -.SH "SEE ALSO" -intro(4), -config(8), -mknod(8) +.Sh SEE ALSO +.Xr intro 4 , +.Xr config 8 , +.Xr mknod 8 +.Sh HISTORY +The +.Nm +command appeared in +.Bx 4.2 . diff --git a/usr/src/share/man/man8/man8.hp300/crash.8 b/usr/src/share/man/man8/man8.hp300/crash.8 index 38158dbdf8..b51b25a021 100644 --- a/usr/src/share/man/man8/man8.hp300/crash.8 +++ b/usr/src/share/man/man8/man8.hp300/crash.8 @@ -1,29 +1,33 @@ -.\" Copyright (c) 1990 Regents of the University of California. -.\" All rights reserved. The Berkeley software License Agreement -.\" specifies the terms and conditions for redistribution. +.\" Copyright (c) 1990, 1991 Regents of the University of California. +.\" All rights reserved. .\" -.\" @(#)crash.8 5.1 (Berkeley) %G% +.\" %sccs.include.redist.man% .\" -.TH CRASH 8 "" -.UC 7 -.SH NAME -crash \- what happens when the system crashes -.SH DESCRIPTION -This section explains what happens when the system crashes +.\" @(#)crash.8 5.2 (Berkeley) %G% +.\" +.Dd +.Dt CRASH 8 +.Os +.Sh NAME +.Nm crash +.Nd UNIX system failures +.Sh DESCRIPTION +This section explains a bit about system crashes and (very briefly) how to analyze crash dumps. -.PP +.Pp When the system crashes voluntarily it prints a message of the form -.IP +.Bd -ragged -offset indent panic: why i gave up the ghost -.LP +.Ed +.Pp on the console, takes a dump on a mass storage peripheral, and then invokes an automatic reboot procedure as described in -.IR reboot (8). +.Xr reboot 8 . Unless some unexpected inconsistency is encountered in the state of the file systems due to hardware or software failure, the system will then resume multi-user operations. -.PP +.Pp The system has a large number of internal consistency checks; if one of these fails, then it will panic with a very short message indicating which one failed. @@ -31,82 +35,67 @@ In many instances, this will be the name of the routine which detected the error, or a two-word description of the inconsistency. A full understanding of most panic messages requires perusal of the source code for the system. -.PP +.Pp The most common cause of system failures is hardware failure, which can reflect itself in different ways. Here are the messages which are most likely, with some hints as to causes. Left unstated in all cases is the possibility that hardware or software error produced the message in some unexpected way. -.TP -.B iinit +.Pp +.Bl -tag -width Ds -compact +.It Sy iinit This cryptic panic message results from a failure to mount the root filesystem during the bootstrap process. Either the root filesystem has been corrupted, or the system is attempting to use the wrong device as root filesystem. Usually, an alternate copy of the system binary or an alternate root filesystem can be used to bring up the system to investigate. -.TP -.B Can't exec /etc/init +.Pp +.It Sy "Can't exec /etc/init" This is not a panic message, as reboots are likely to be futile. Late in the bootstrap procedure, the system was unable to locate and execute the initialization process, -.IR init (8). +.Xr init 8 . The root filesystem is incorrect or has been corrupted, or the mode -or type of /etc/init forbids execution. -.TP -.B IO err in push -.ns -.TP -.B hard IO err in swap +or type of +.Pa /etc/init +forbids execution. +.Pp +.It Sy "IO err in push" +.It Sy "hard IO err in swap" The system encountered an error trying to write to the paging device or an error in reading critical information from a disk drive. The offending disk should be fixed if it is broken or unreliable. -.TP -.B realloccg: bad optim -.ns -.TP -.B ialloc: dup alloc -.ns -.TP -.B alloccgblk: cyl groups corrupted -.ns -.TP -.B ialloccg: map corrupted -.ns -.TP -.B free: freeing free block -.ns -.TP -.B free: freeing free frag -.ns -.TP -.B ifree: freeing free inode -.ns -.TP -.B alloccg: map corrupted +.Pp +.It Sy "realloccg: bad optim" +.It Sy "ialloc: dup alloc" +.It Sy "alloccgblk:cyl groups corrupted" +.It Sy "ialloccg: map corrupted" +.It Sy "free: freeing free block" +.It Sy "free: freeing free frag" +.It Sy "ifree: freeing free inode" +.It Sy "alloccg: map corrupted" These panic messages are among those that may be produced when filesystem inconsistencies are detected. The problem generally results from a failure to repair damaged filesystems after a crash, hardware failures, or other condition that should not normally occur. A filesystem check will normally correct the problem. -.TP -.B timeout table overflow -.ns +.Pp +.It Sy "timeout table overflow" This really shouldn't be a panic, but until the data structure involved is made to be extensible, running out of entries causes a crash. If this happens, make the timeout table bigger. -.TP -.B "trap type %d, code = %x, v = %x" +.Pp +.It Sy "trap type %d, code = %x, v = %x" An unexpected trap has occurred within the system; the trap types are: -.sp -.nf +.Bl -column xxxx -offset indent 0 bus error 1 address error 2 illegal instruction 3 divide by zero -4 \fIchk\fP instruction -5 \fItrapv\fP instruction +.No 4\t Em chk No instruction +.No 5\t Em trapv No instruction 6 privileged instruction 7 trace trap 8 MMU fault @@ -115,11 +104,13 @@ An unexpected trap has occurred within the system; the trap types are: 11 FP coprocessor fault 12 coprocessor fault 13 simulated AST -.fi -.sp +.El +.Pp The favorite trap type in system crashes is trap type 8, indicating a wild reference. -``code'' (hex) is the concatenation of the MMU status register +``code'' (hex) is the concatenation of the +MMU +status register (see ) in the high 16 bits and the 68020 special status word (see the 68020 manual, page 6-17) @@ -135,46 +126,51 @@ this process may not be related to the panic. ``pc'' (hex) is the value of the program counter saved on the hardware exception frame. It may -.I not +.Em not be the PC of the instruction causing the fault. ``sfc'' and ``dfc'' (hex) are the 68020 source/destination function codes. They should always be one. -``p0'' and ``p1'' are the VAX-like region registers. +``p0'' and ``p1'' are the +VAX-like +region registers. They are of the form: -.sp - '@' -.sp +.Pp +.Bd -ragged -offset indent + '@' +.Ed +.Pp where both are in hex. Following these values are a dump of the processor registers (hex). Finally, is a dump of the stack (user/kernel) at the time of the offense. -.TP -.B init died +.Pp +.It Sy "init died" The system initialization process has exited. This is bad news, as no new users will then be able to log in. Rebooting is the only fix, so the system just does it right away. -.TP -.B out of mbufs: map full +.Pp +.It Sy "out of mbufs: map full" The network has exhausted its private page map for network buffers. This usually indicates that buffers are being lost, and rather than allow the system to slowly degrade, it reboots immediately. The map may be made larger if necessary. -.PP +.El +.Pp That completes the list of panic types you are likely to see. -.PP +.Pp When the system crashes it writes (or at least attempts to write) an image of memory into the back end of the dump device, usually the same as the primary swap area. After the system is rebooted, the program -.IR savecore (8) +.Xr savecore 8 runs and preserves a copy of this core image and the current system in a specified directory for later perusal. See -.IR savecore (8) +.Xr savecore 8 for details. -.PP +.Pp To analyze a dump you should begin by running -.IR adb (1) +.Xr adb 1 with the -.B \-k +.Fl k flag on the system load image and core dump. If the core image is the result of a panic, the panic message is printed. @@ -183,16 +179,21 @@ Normally the command will provide a stack trace from the point of the crash and this will provide a clue as to what went wrong. -A more complete discussion -of system debugging is impossible here. -See, however, -``Using ADB to Debug the UNIX Kernel''. -.SH "SEE ALSO" -adb(1), -reboot(8) -.br -.I "MC68020 32-bit Microprocessor User's Manual" -.br -.I "Using ADB to Debug the UNIX Kernel" -.br -.I "4.3BSD for the HP300" +For more details consult +.%T "Using ADB to Debug the UNIX Kernel" . +.Sh SEE ALSO +.Xr adb 1 , +.Xr reboot 8 +.Rs +.%T "MC68020 32-bit Microprocessor User's Manual" +.Re +.Rs +.%T "Using ADB to Debug the UNIX Kernel +.Re +.Rs +.%T "4.3BSD for the HP300" +.Re +.Sh HISTORY +A +.Nm +man page appeared in Version 6 AT&T UNIX. diff --git a/usr/src/share/man/man8/man8.hp300/format.8 b/usr/src/share/man/man8/man8.hp300/format.8 index c4e6789d04..515b14f733 100644 --- a/usr/src/share/man/man8/man8.hp300/format.8 +++ b/usr/src/share/man/man8/man8.hp300/format.8 @@ -1,4 +1,4 @@ -.\" Copyright (c) 1990 The Regents of the University of California. +.\" Copyright (c) 1990, 1991 The Regents of the University of California. .\" All rights reserved. .\" .\" This code is derived from software contributed to Berkeley by @@ -7,17 +7,35 @@ .\" .\" %sccs.include.redist.man% .\" -.\" @(#)format.8 5.1 (Berkeley) %G% +.\" @(#)format.8 5.2 (Berkeley) %G% .\" -.TH FORMAT 8 "" -.SH NAME -format \- how to format disks and tapes -.SH DESCRIPTION -.PP -Currently, there are no ``native'' BSD media formatting utilities. +.Dd +.Dt FORMAT 8 +.Os +.Sh NAME +.Nm format +.Nd how to format disks and tapes +.Sh DESCRIPTION +.Pp +Currently, there are no +.Dq native +.Tn BSD +media formatting utilities. Formatting of both disks and cartridge tapes must be done either -standalone or under HP-UX using the -.I mediainit -utility distributed by HP. -Note that HP-brand cartridge tapes come pre-formatted, and HP disks +standalone or under +.Tn HP-UX +using the +.Em mediainit +utility distributed by +.Tn HP . +Note that +.Tn HP Ns -brand +cartridge tapes come pre-formatted, and +.Tn HP +disks are supposed to. +.Sh HISTORY +The +.Nm +command +.Ud diff --git a/usr/src/share/man/man8/man8.vax/drtest.8 b/usr/src/share/man/man8/man8.vax/drtest.8 index 4d30e8c2d6..cb2fe40822 100644 --- a/usr/src/share/man/man8/man8.vax/drtest.8 +++ b/usr/src/share/man/man8/man8.vax/drtest.8 @@ -1,16 +1,18 @@ -.\" Copyright (c) 1983 Regents of the University of California. -.\" All rights reserved. The Berkeley software License Agreement -.\" specifies the terms and conditions for redistribution. +.\" Copyright (c) 1983, 1991 Regents of the University of California. +.\" All rights reserved. .\" -.\" @(#)drtest.8 6.2 (Berkeley) %G% +.\" %sccs.include.redist.man% .\" -.TH DRTEST 8 "" -.UC 5 -.SH NAME -drtest \- standalone disk test program -.SH DESCRIPTION -.PP -.I Drtest +.\" @(#)drtest.8 6.3 (Berkeley) %G% +.\" +.Dd +.Dt DRTEST 8 +.Os BSD 4.2 +.Sh NAME +.Nm drtest +.Nd standalone disk test program +.Sh DESCRIPTION +.Nm Drtest is a standalone program used to read a disk track by track. It was primarily intended as a test program @@ -18,57 +20,69 @@ for new standalone drivers, but has shown useful in other contexts as well, such as verifying disks and running speed tests. For example, when a disk has been formatted -(by format(8)), you can check that +(by +.Xr format 8 ) , +you can check that hard errors has been taken care of by running -.IR drtest . +.Nm drtest . No hard errors should be found, but in many cases -quite a few soft ECC errors will be reported. -.PP +quite a few soft +.Tn ECC +errors will be reported. +.Pp While -.I drtest +.Nm drtest is running, the cylinder number is printed on the console for every 10th cylinder read. -.SH EXAMPLE +.Sh EXAMPLE A sample run of -.I drtest +.Xr drtest is shown below. In this example (using a 750), -.I drtest +.Nm drtest is loaded from the root file system; usually it will be loaded from the machine's console storage device. Boldface means user input. As usual, ``#'' and ``@'' may be used to edit input. -.nf -.in +5 -.sp 1 ->>>\fBB/3\fR -%% -loading hk(0,0)boot -Boot -: \fBhk(0,0)drtest\fR -Test program for stand-alone up and hp driver -.sp 1 -Debugging level (1=bse, 2=ecc, 3=bse+ecc)? -Enter disk name [type(adapter,unit), e.g. hp(1,3)]? \fBhp(0,0)\fR -Device data: #cylinders=1024, #tracks=16, #sectors=32 -Testing hp(0,0), chunk size is 16384 bytes. -\fI(chunk size is the number of bytes read per disk access)\fP -Start ...Make sure hp(0,0) is online - ... -\fI(errors are reported as they occur)\fP - ... -\fI(...program restarts to allow checking other disks)\fP -\fI(...to abort halt machine with ^P)\fP -.in -5 -.fi -.sp 1 -.SH DIAGNOSTICS +.Pp +.Bd -unfilled -offset indent -compact +.Li \&>>> Ns Sy B/3 +.Li \&%% +.Li \&loading hk(0,0)boot +.Li \&Boot +.Li \&: Sy \&hk(0,0)drtest +.Li Test program for stand-alone up and hp driver + +.Li Debugging level (1=bse, 2=ecc, 3=bse+ecc)? +.Li Enter disk name [type(adapter,unit),\ e.g.\ hp(1,3)]? Sy hp(0,0) +.Li Device data: #cylinders=1024, #tracks=16, #sectors=32 +.Li Testing hp(0,0), chunk size is 16384 bytes. +.Em (chunk\ size\ is\ the\ number\ of\ bytes read per disk access) +.Li Start ...Make sure hp(0,0) is online +.Li \ ... +.Em (errors are reported as they occur) +.Li \ ... +.Em (...program restarts to allow checking other disks) +.Em (...to abort halt machine with \&^P) +.Ed +.Sh DIAGNOSTICS The diagnostics are intended to be self explanatory. Note, however, that the device number -in the diagnostic messages is identified as \fItypeX\fR instead of -\fItype(a,u)\fR where \fIX\fR = a*8+u, e.g., hp(1,3) becomes hp11. -.SH SEE ALSO -format(8V), bad144(8) -.SH AUTHOR +in the diagnostic messages is identified as +.Em typeX +instead of +.Em type(a,u) +where +.Ar X +\&= a*8+u, e.g., hp(1,3) becomes hp11. +.Sh SEE ALSO +.Xr format 8 , +.Xr bad144 8 +.Sh AUTHOR Helge Skrivervik +.Sh HISTORY +The +.Nm +command appeared in +.Bx 4.2 . diff --git a/usr/src/share/man/man8/man8.vax/installboot.8 b/usr/src/share/man/man8/man8.vax/installboot.8 index a57477235c..6b758a5de5 100644 --- a/usr/src/share/man/man8/man8.vax/installboot.8 +++ b/usr/src/share/man/man8/man8.vax/installboot.8 @@ -1,41 +1,54 @@ -.\" Copyright (c) 1986 Regents of the University of California. -.\" All rights reserved. The Berkeley software License Agreement -.\" specifies the terms and conditions for redistribution. +.\" Copyright (c) 1986, 1991 Regents of the University of California. +.\" All rights reserved. .\" -.\" @(#)installboot.8 7.1 (Berkeley) %G% +.\" %sccs.include.redist.man% .\" -.TH INSTALLBOOT 8V "" -.UC 7 -.SH NAME -installboot \- installs a boot program in a file system -.SH SYNOPSIS -.B /usr/mdec/installboot -bootblock bootprog special -.SH DESCRIPTION -.I Installboot +.\" @(#)installboot.8 7.2 (Berkeley) %G% +.\" +.Dd +.Dt INSTALLBOOT 8 +.Os BSD 4.3t +.Sh NAME +.Nm installboot +.Nd installs a boot program in a file system +.Sh SYNOPSIS +.Nm installboot +.Ar bootblock bootprog special +.Sh DESCRIPTION +.Xr Installboot concatentates -.I bootblock +.Ar bootblock and -.I bootprog -and writes at most BBSIZE bytes (from ) +.Ar bootprog +and writes at most +.Dv BBSIZE +bytes (from +.Aq Pa sys/fs.h ) of them on the first bytes of -.IR special . -.SH FILES -/usr/mdec/??boot boot blocks -.br -/usr/mdec/boot?? boot programs -.SH SEE ALSO -newfs(8), dd(1) -.SH EXAMPLES +.Ar special . +.Sh FILES +.Bl -tag -width /usr/mdec/bootxxx -compact +.It Pa /usr/mdec/??boot +boot blocks +.It Pa /usr/mdec/boot?? +boot programs +.El +.Sh SEE ALSO +.Xr newfs 8 , +.Xr dd 1 +.Sh EXAMPLES +.Bd -literal -offset indent -compact cd /usr/mdec -.br installboot raboot bootra /dev/ra0a -.SH HISTORY -.I Installboot -comes undocumented with 4.2BSD. -This manual page was written by Geoff Collyer. -.SH BUGS +.Ed +.Sh BUGS There is no convenient way to determine the names of the boot blocks and boot programs without -.I "a priori" +.Em a priori knowledge of one's make of disk. +.Sh HISTORY +The +.Nm +command appeared in +.Bx 4.3 tahoe . +This manual page was written by Geoff Collyer. diff --git a/usr/src/share/man/man8/rc.8 b/usr/src/share/man/man8/rc.8 index 5bb9edea89..4874f9e9c7 100644 --- a/usr/src/share/man/man8/rc.8 +++ b/usr/src/share/man/man8/rc.8 @@ -1,64 +1,80 @@ -.\" Copyright (c) 1980 Regents of the University of California. -.\" All rights reserved. The Berkeley software License Agreement -.\" specifies the terms and conditions for redistribution. +.\" Copyright (c) 1980, 1991 Regents of the University of California. +.\" All rights reserved. .\" -.\" @(#)rc.8 6.1 (Berkeley) %G% +.\" %sccs.include.redist.man% .\" -.TH RC 8 "" -.UC 4 -.SH NAME -rc \- command script for auto-reboot and daemons -.SH SYNOPSIS -.B /etc/rc -.br -.B /etc/rc.local -.SH DESCRIPTION -.I Rc +.\" @(#)rc.8 6.2 (Berkeley) %G% +.\" +.Dd +.Dt RC 8 +.Os BSD 4 +.Sh NAME +.Nm rc +.Nd command script for auto\-reboot and daemons +.Sh SYNOPSIS +.Nm rc +.Nm rc.local +.Sh DESCRIPTION +.Nm Rc is the command script which controls the automatic reboot and -.I rc.local +.Nm rc.local is the script holding commands which are pertinent only to a specific site. -.PP +.Pp When an automatic reboot is in progress, -.I rc +.Nm rc is invoked with the argument -.I autoboot -and runs a -.I fsck +.Em autoboot . +The first portion of +.Nm rc +runs an +.Xr fsck 8 with option -.B \-p +.Fl p to ``preen'' all the disks of minor inconsistencies resulting from the last system shutdown and to check for serious inconsistencies caused by hardware or software failure. If this auto-check and repair succeeds, then the second part of -.I rc +.Nm rc is run. -.PP +.Pp The second part of -.I rc, +.Nm rc , which is run after a auto-reboot succeeds and also if -.I rc +.Nm rc is invoked when a single user shell terminates (see -.IR init (8)), +.Xr init 8 ) , starts all the daemons on the system, preserves editor files and clears the scratch directory -.B /tmp. -.I Rc.local +.Pa /tmp . +.Pp +.Nm Rc.local is executed immediately before any other commands after a successful -.IR fsck . +.Xr fsck . Normally, the first commands placed in the -.I rc.local +.Nm rc.local file define the machine's name, using -.IR hostname (1), +.Xr hostname 1 , and save any possible core image that might have been -generated as a result of a system crash, -.IR savecore (8). +generated as a result of a system crash, with +.Xr savecore 8 . The latter command is included in the -.I rc.local +.Nm rc.local file because the directory in which core dumps are saved is usually site specific. -.SH SEE ALSO -init(8), -reboot(8), -savecore(8) -.SH BUGS +.Pp +Following tradition, the startup files +.Nm rc +and +.Nm rc.local +reside in +.Pa /etc . +.Sh SEE ALSO +.Xr init 8 , +.Xr reboot 8 , +.Xr savecore 8 +.Sh HISTORY +The +.Nm +command appeared in +.Bx 4.0 . diff --git a/usr/src/share/man/man8/sticky.8 b/usr/src/share/man/man8/sticky.8 index 54ffaf273b..e471efcab4 100644 --- a/usr/src/share/man/man8/sticky.8 +++ b/usr/src/share/man/man8/sticky.8 @@ -1,40 +1,48 @@ -.\" Copyright (c) 1980 Regents of the University of California. -.\" All rights reserved. The Berkeley software License Agreement -.\" specifies the terms and conditions for redistribution. +.\" Copyright (c) 1980, 1991 Regents of the University of California. +.\" All rights reserved. .\" -.\" @(#)sticky.8 6.6 (Berkeley) %G% +.\" %sccs.include.redist.man% .\" -.TH STICKY 8 "" -.UC 4 -.SH NAME -sticky \- persistent text and append-only directories -.SH DESCRIPTION -The -.I "sticky bit" -(file mode bit 01000, see -.IR chmod (2)) +.\" @(#)sticky.8 6.4 (Berkeley) %G% +.\" +.Dd +.Dt STICKY 8 +.Os BSD 4 +.Sh NAME +.Nm sticky +.Nd sticky text and append-only directories +.Sh DESCRIPTION +A special file mode, called the +.Em sticky bit +(mode S_ISVTX), is used to indicate special treatment -for certain executable files and directories. -.SH "STICKY TEXT EXECUTABLE FILES" -While the `sticky bit' -is set on a sharable executable file, -the text of that file will not be removed from the system swap area. -Thus the file does not have to be fetched from the file system -upon each execution. +for shareable executable files and directories. +See +.Xr chmod 2 +or +the file +.Pa /usr/include/sys/stat.h +for an explanation of file modes. +.Sh STICKY TEXT EXECUTABLE FILES +An executable shareable file whose sticky bit is set +will not be immediately discarded from swap space after execution. +The kernel will hoard the text segment of the file for future +reuse and avoid having to reload the program. Shareable text segments are normally placed in a least-frequently-used cache after use, and thus the `sticky bit' has little effect on commonly-used text images. -.PP -Sharable executable files are made by the -.B \-n +.Pp +Sharable executable files are created with the +.Fl n and -.B \-z +.Fl z options of -.IR ld (1). -.PP +the loader +.Xr ld 1 . +.Pp Only the super-user can set the sticky bit on a sharable executable file. -.SH "STICKY DIRECTORIES" +.Sh STICKY DIRECTORIES A directory whose `sticky bit' is set becomes an append-only directory, or, more accurately, a directory in which the deletion of files is restricted. @@ -42,21 +50,26 @@ A file in a sticky directory may only be removed or renamed by a user if the user has write permission for the directory and the user is the owner of the file, the owner of the directory, or the super-user. -This feature is usefully applied to directories such as /tmp +This feature is usefully applied to directories such as +.Pa /tmp which must be publicly writable but should deny users the license to arbitrarily delete or rename each others' files. -.PP +.Pp Any user may create a sticky directory. See -.IR chmod (1) +.Xr chmod 1 for details about modifying file modes. -.SH BUGS +.Sh BUGS Since the text areas of sticky text executables are stashed in the swap area, abuse of the feature can cause a system to run out of swap. -.PP +.Pp Neither -.IR open (2) +.Xr open 2 nor -.IR mkdir (2) +.Xr mkdir 2 will create a file with the sticky bit set. +.Sh HISTORY +A +.Nm +command appeared in Version 32V AT&T UNIX. diff --git a/usr/src/usr.bin/renice/renice.8 b/usr/src/usr.bin/renice/renice.8 index 67b01313c1..1f1a4194f7 100644 --- a/usr/src/usr.bin/renice/renice.8 +++ b/usr/src/usr.bin/renice/renice.8 @@ -1,77 +1,105 @@ -.\" Copyright (c) 1983 The Regents of the University of California. +.\" Copyright (c) 1983, 1991 The Regents of the University of California. .\" All rights reserved. .\" .\" %sccs.include.redist.man% .\" -.\" @(#)renice.8 6.4 (Berkeley) %G% +.\" @(#)renice.8 6.5 (Berkeley) %G% .\" -.UC 7 -.TH RENICE 8 "" -.UC 4 -.SH NAME -renice \- alter priority of running processes -.SH SYNOPSIS -.B renice -priority [ [ -.B \-p -] pid ... ] [ [ -.B \-g -] pgrp ... ] [ [ -.B \-u -] user ... ] -.SH DESCRIPTION -.I Renice +.Dd +.Dt RENICE 8 +.Os BSD 4 +.Sh NAME +.Nm renice +.Nd alter priority of running processes +.Sh SYNOPSIS +.Nm renice +.Ar priority +.Oo +.Op Fl p +.Ar pid ... +.Oc +.Oo +.Op Fl g +.Ar pgrp ... +.Oc +.Oo +.Op Fl u +.Ar user ... +.Oc +.Sh DESCRIPTION +.Nm Renice alters the scheduling priority of one or more running processes. -The -.I who +The following +.Ar who parameters are interpreted as process ID's, process group ID's, or user names. -.IR Renice 'ing +.Nm Renice Ns 'ing a process group causes all processes in the process group to have their scheduling priority altered. -.IR Renice 'ing +.Nm Renice Ns 'ing a user causes all processes owned by the user to have their scheduling priority altered. By default, the processes to be affected are specified by -their process ID's. To force -.I who -parameters to be interpreted as process group ID's, a -.B \-g -may be specified. To force the -.I who -parameters to be interpreted as user names, a -.B \-u -may be given. Supplying -.B \-p -will reset -.I who +their process ID's. +.Pp +Options supported by +.Nm renice : +.Bl -tag -width Ds +.It Fl g +Force +.Ar who +parameters to be interpreted as process group ID's. +.It Fl u +Force the +.Ar who +parameters to be interpreted as user names. +.It Fl p +Resets the +.Ar who interpretation to be (the default) process ID's. +.El +.Pp For example, -.sp - renice +1 987 -u daemon root -p 32 -.sp +.Bd -literal -offset +renice +1 987 -u daemon root -p 32 +.Ed +.Pp would change the priority of process ID's 987 and 32, and all processes owned by users daemon and root. -.PP +.Pp Users other than the super-user may only alter the priority of processes they own, and can only monotonically increase their ``nice value'' -within the range 0 to PRIO_MAX (20). +within the range 0 to +.Dv PRIO_MAX +(20). (This prevents overriding administrative fiats.) The super-user may alter the priority of any process -and set the priority to any value in the range PRIO_MIN (\-20) -to PRIO_MAX. +and set the priority to any value in the range +.Dv PRIO_MIN +(\-20) +to +.Dv PRIO_MAX . Useful priorities are: 20 (the affected processes will run only when nothing else in the system wants to), 0 (the ``base'' scheduling priority), anything negative (to make things go very fast). -.SH FILES -/etc/passwd to map user names to user ID's -.SH SEE ALSO -getpriority(2), setpriority(2) -.SH BUGS +.Sh FILES +.Bl -tag -width /etc/passwd -compact +.It Pa /etc/passwd +to map user names to user ID's +.El +.Sh SEE ALSO +.Xr getpriority 2 , +.Xr setpriority 2 +.Sh BUGS Non super-users can not increase scheduling priorities of their own processes, even if they were the ones that decreased the priorities in the first place. +.Sh HISTORY +The +.Nm +command appeared in +.Bx 4.0 . diff --git a/usr/src/usr.bin/showmount/showmount.8 b/usr/src/usr.bin/showmount/showmount.8 index 6975ef3b39..2e21cd87a8 100644 --- a/usr/src/usr.bin/showmount/showmount.8 +++ b/usr/src/usr.bin/showmount/showmount.8 @@ -1,4 +1,4 @@ -.\" Copyright (c) 1989 The Regents of the University of California. +.\" Copyright (c) 1989, 1991 The Regents of the University of California. .\" All rights reserved. .\" .\" This code is derived from software contributed to Berkeley by @@ -6,46 +6,58 @@ .\" .\" %sccs.include.redist.man% .\" -.\" @(#)showmount.8 6.2 (Berkeley) %G% +.\" @(#)showmount.8 6.3 (Berkeley) %G% .\" -.TH SHOWMOUNT 8 "" -.UC 4 -.SH NAME -showmount \- show remote nfs mounts on host -.SH SYNOPSIS -.B showmount -[ -.B \-ade -] -[ -.B host -] -.SH DESCRIPTION -.I Showmount -shows status information about the NFS server on -.I host. -By default it prints the names of all hosts that have NFS file systems mounted -on the host. See "NFS: Network File System Protocol Specification, RFC1094, -Appendix A" for a detailed desciption of the protocol. -.TP -.B \-a +.Dd +.Dt SHOWMOUNT 8 +.Os BSD 4 +.Sh NAME +.Nm showmount +.Nd show remote nfs mounts on host +.Sh SYNOPSIS +.Nm showmount +.Op Fl ade +.Op Ar host +.Sh DESCRIPTION +.Nm Showmount +shows status information about the +.Tn NFS +server on +.Ar host . +By default it prints the names of all hosts that have +.Tn NFS +file systems mounted +on the host. See +.%T "NFS: Network File System Protocol Specification" , +RFC 1094, +Appendix A , +for a detailed desciption of the protocol. +.Bl -tag -width Ds +.It Fl a List all mount points in the form: -.RS -.RS -.I host:dirpath -.RE -.RE -.TP -.B \-d +.Bd -ragged -offset indent -compact +.Ar host : Ns Ar dirpath +.Ed +.It Fl d List directory paths of mount points instead of hosts -.TP -.B \-e +.It Fl e Show the -.I host's +.Ar host Ns 's exports list -.SH "SEE ALSO" -mount(1), mountd(8) -.SH BUGS +.El +.Sh SEE ALSO +.Xr mount 1 , +.Xr mountd 8 +.Sh BUGS The mount daemon running on the server only has an idea of the actual mounts, -since the NFS server is stateless. Showmount will only display the information +since the +.Tn NFS +server is stateless. +.Nm Showmount +will only display the information as accurately as the mount daemon reports it. +.Sh HISTORY +The +.Nm +command +.Ud diff --git a/usr/src/usr.bin/uucp/uucico/uucico.8 b/usr/src/usr.bin/uucp/uucico/uucico.8 index 7f4bf70e2d..182cf73fb0 100644 --- a/usr/src/usr.bin/uucp/uucico/uucico.8 +++ b/usr/src/usr.bin/uucp/uucico/uucico.8 @@ -1,228 +1,273 @@ -.\" Copyright (c) 1988 Regents of the University of California. -.\" All rights reserved. The Berkeley software License Agreement -.\" specifies the terms and conditions for redistribution. +.\" Copyright (c) 1988, 1991 Regents of the University of California. +.\" All rights reserved. .\" -.\" @(#)uucico.8 6.5 (Berkeley) %G% +.\" %sccs.include.redist.man% .\" -.TH UUCICO 8 "" -.UC 6 -.SH NAME -uucico, uucpd \- transfer files queued by uucp or uux -.SH SYNOPSIS -.B /usr/lib/uucp/uucico -[ -.BI \-d spooldir -] [ -.BI \-g grade -] [ -.BI \-r role -] [ -.B \-R -] [ -.BI \-s system -] [ -.BI \-x debug -] [ -.B \-L -] [ -.BI \-t turnaround -] -.PP -.B uucpd -.SH DESCRIPTION -.I Uucico +.\" @(#)uucico.8 6.6 (Berkeley) %G% +.\" +.Dd +.Dt UUCICO 8 +.Os BSD 4.3 +.Sh NAME +.Nm uucico , +.Nm uucpd +.Nd transfer files queued by uucp or uux +.Sh SYNOPSIS +.Nm uucico +.Op Fl L +.Op Fl R +.Op Fl d Ns Ar spooldir +.Op Fl g Ns Ar grade +.Op Fl r Ns Ar role +.Op Fl s Ns Ar system +.Op Fl x Ns Ar debug +.Op Fl t Ns Ar turnaround +.Nm uucpd +.Sh DESCRIPTION +.Nm Uucico performs the actual work involved in transferring files between -systems. -.IR Uucp (1) +systems. +.Xr Uucp 1 and -.IR uux (1) +.Xr uux 1 merely queue requests for data transfer which -.I uucico +.Nm uucico processes. -.PP +.Pp The following options are available. -.TP 8 -.BI \-d spooldir +.Bl -tag -width Ds +.It Fl L +Only call +.Dq local +sites. A site is considered local if the device-type field in +.Xr L.sys 5 +is one of +.Tn LOCAL , DIR +or +.Tn TCP . +.It Fl R +Reverse roles. When used with the +.Fl r Ns Ar 1 +option, this tells the remote system to begin sending its +jobs first, instead of waiting for the local machine to finish. +.It Fl d Ns Ar spooldir Use -.I spooldir -as the spool directory. The default is /var/spool/uucp. -.TP 8 -.BI \-g grade +.Ar spooldir +as the spool directory. The default is +.Pa /var/spool/uucp. +.It Fl g Ns Ar grade Only send jobs of grade -.I grade +.Ar grade or higher this transfer. The grade of a job is specified when the job is queued by -.I uucp +.Xr uucp 1 or -.IR uux . -.TP 8 -.BI \-r role -.I role +.Xr uux 1 . +.It Fl r Ns Ar role +.Ar role is either 1 or 0; it indicates whether -.I uucico -is to start up in -master or slave role, respectively. 1 is used when running -.I uucico +.Nm uucico +is to start up in +master or slave role, respectively. 1 is used when running +.Nm uucico by hand or from -.IR cron (8). +.Xr cron 8 . 0 is used when another system calls the local system. Slave role is the default. -.TP 8 -.B \-R -Reverse roles. When used with the -.B \-r1 -option, this tells the remote system to begin sending its -jobs first, instead of waiting for the local machine to finish. -.TP 8 -.BI \-s system +.It Fl s Ns Ar system Call only system -.IR system . -If -.B \-s -is not specified, and \-r1 is specified, -.I uucico +.Ar system . +If +.Fl s +is not specified, and +.Fl r Ns Ar 1 +is specified, +.Nm uucico will attempt to call all systems for which there is work. If -.B \-s +.Fl s is specified, a call will be made even if there is no work for that system. This is useful for polling. -.TP 8 -.BI \-x debug -Turn on debugging at level -.IR debug . -Level 5 is a good start when trying to find out why a call -failed. Level 9 is very detailed. Level 99 is absurdly verbose. -If -.I role -is 1 (master), output is normally written to the standard message -output -.IR stderr . -If -.I stderr -is unavailable, output is written to -.RI /var/spool/uucp/AUDIT/ system. -When -.I role -is 0 (slave), debugging output is always written to the AUDIT -file. -.TP 8 -.B \-L -Only call ``local'' sites. A site is considered local if -the device-type field in -.I L.sys -is one of LOCAL, DIR or TCP. -.TP 8 -.BI \-t turnaround +.It Fl t Ns Ar turnaround Use -.I turnaround -as the line turnaround time (in minutes) instead of the default 30. If -.I turnaround +.Ar turnaround +as the line turnaround time (in minutes) instead of the default 30. If +.Ar turnaround is missing or 0, line turnaround will be disabled. After -.I uucico +.Nm uucico has been running in slave role for -.I turnaround +.Ar turnaround minutes, it will attempt to run in master role by negotiating with the remote machine. In earlier versions of -.IR uucico , +.Nm uucico , a transfer of many large files in one direction would hold up mail going in the other direction. With the turnaround code working, the message flow will be more bidirectional in the short term. This option only works with newer -.IR uucico 's +.Nm uucico Ns 's and is ignored by older ones. -.PP +.It Fl x Ns Ar debug +Turn on debugging at level +.Ar debug . +Level 5 is a good start when trying to find out why a call +failed. Level 9 is very detailed. Level 99 is absurdly verbose. +If +.Ar role +is 1 (master), output is written to the standard error +.Em stderr . +If +.Em stderr +is unavailable, output is written to +.Pa /var/spool/uucp/AUDIT/ Ns Ar system . +When +.Ar role +is 0 (slave), debugging output is always written to the +AUDIT +file. +.El +.Pp If -.I uucico +.Nm uucico receives a -.B SIGFPE +.Dv SIGFPE (see -.IR kill (1)), +.Xr kill 1 ) , it will toggle the debugging on or off. -.PP -.I Uucpd +.Pp +.Nm Uucpd is the server for supporting uucp connections over networks. -.I Uucpd +.Nm Uucpd listens for service requests at the port indicated in the ``uucp'' -service specification; see \fIservices\fP\|(5). +service specification; see +.Xr services 5 . The server provides login name and password authentication before starting up -.I uucico +.Nm uucico for the rest of the transaction. -.PP -.I Uucico +.Pp +.Nm Uucico is commonly used either of two ways: as a daemon run periodically by -.IR cron (8) +.Xr cron 8 to call out to remote systems, and as a ``shell'' for remote systems who call in. For calling out periodically, a typical line in -.I crontab +.Xr crontab would be: -.PP -.nf - 0 * * * * /usr/lib/uucp/uucico -r1 -.fi -.PP +.Bd -literal +0 * * * * /usr/lib/uucp/uucico -r1 +.Ed +.Pp This will run -.I uucico -every hour in master role. -For each system that has transfer requests queued, -.I uucico +.Nm uucico +every hour in master role. +For each system that has transfer requests queued, +.Nm uucico calls the system, logs in, and executes the transfers. The file -.IR L.sys (5) +.Xr L.sys 5 is consulted for information about how to log in, while -.IR L-devices (5) +.Xr L-devices 5 specifies available lines and modems for calling. -.PP +.Pp For remote systems to dial in, an entry in the -.IR passwd (5) +.Xr passwd 5 file must be created, with a login ``shell'' of -.IR uucico . +.Nm uucico . For example: -.PP -.nf - nuucp:Password:6:1::/var/spool/uucppublic:/usr/lib/uucp/uucico -.fi -.PP -The UID for UUCP remote logins is not critical, so long as it differs from -the UUCP Administrative login. -The latter owns the UUCP files, and assigning -this UID to a remote login would be an extreme security hazard. -.SH FILES -.ta \w'/var/spool/uucp/D.hostnameX/ 'u -.nf -/usr/lib/uucp/ UUCP internal files/utilities -/usr/lib/uucp/L-devices Local device descriptions -/usr/lib/uucp/L-dialcodes Phone numbers and prefixes -/usr/lib/uucp/L.aliases Hostname aliases -/usr/lib/uucp/L.cmds Remote command permissions list -/usr/lib/uucp/L.sys Host connection specifications -/usr/lib/uucp/USERFILE Remote directory tree permissions list -.PP -/var/spool/uucp/ Spool directory -/var/spool/uucp/AUDIT/* Debugging audit trails -/var/spool/uucp/C./ Control files directory -/var/spool/uucp/D./ Incoming data file directory -/var/spool/uucp/D.hostname/ Outgoing data file directory -/var/spool/uucp/D.hostnameX/ Outgoing execution file directory -/var/spool/uucp/CORRUPT/ Place for corrupted C. and D. files -/var/spool/uucp/ERRLOG UUCP internal error log -/var/spool/uucp/LOGFILE UUCP system activity log -/var/spool/uucp/LCK/LCK..* Device lock files -/var/spool/uucp/SYSLOG File transfer statistics log -/var/spool/uucp/STST/* System status files -/var/spool/uucp/TM./ File transfer temp directory -/var/spool/uucp/X./ Incoming execution file directory -.PP -/var/spool/uucppublic Public access directory -.fi -.SH SEE ALSO -uucp(1), uuq(1), uux(1), L-devices(5), L-dialcodes(5), L.aliases(5), -L.cmds(5), L.sys(5), uuclean(8), uupoll(8), uusnap(8), uuxqt(8) -.PP -D. A. Nowitz and M. E. Lesk, -.IR "A Dial-Up Network of UNIX Systems" . -.PP -D. A. Nowitz, -.IR "Uucp Implementation Description" . +.Bd -literal +nuucp:Password:6:1::/var/spool/uucppublic:/usr/lib/uucp/uucico +.Ed +.Pp +The +.Tn UID +for +.Tn UUCP +remote logins is not critical, so long as it differs from +the +.Tn UUCP +Administrative login. +The latter owns the +.Tn UUCP +files, and assigning +this +.Tn UID +to a remote login would be an extreme security hazard. +.Sh FILES +.Bl -tag -width /var/spool/uucp/D.hostnameX/ -compact +.It Pa /usr/lib/uucp/ +.Tn UUCP +internal files/utilities +.It Pa /usr/lib/uucp/L-devices +Local device descriptions +.It Pa /usr/lib/uucp/L-dialcodes +Phone numbers and prefixes +.It Pa /usr/lib/uucp/L.aliases +Hostname aliases +.It Pa /usr/lib/uucp/L.cmds +Remote command permissions list +.It Pa /usr/lib/uucp/L.sys +Host connection specifications +.It Pa /usr/lib/uucp/USERFILE +Remote directory tree permissions list +.It Pa /var/spool/uucp/ +Spool directory +.It Pa /var/spool/uucp/AUDIT/* +Debugging audit trails +.It Pa /var/spool/uucp/C./ +Control files directory +.It Pa /var/spool/uucp/D./ +Incoming data file directory +.It Pa /var/spool/uucp/D.hostname/ +Outgoing data file directory +.It Pa /var/spool/uucp/D.hostnameX/ +Outgoing execution file directory +.It Pa /var/spool/uucp/CORRUPT/ +Place for corrupted C. and D. files +.It Pa /var/spool/uucp/ERRLOG +.Tn UUCP +internal error log +.It Pa /var/spool/uucp/LOGFILE +.Tn UUCP +system activity log +.It Pa /var/spool/uucp/LCK/LCK..* +Device lock files +.It Pa /var/spool/uucp/ +.Tn SYSLOG +File transfer statistics log +.It Pa /var/spool/uucp/STST/* +System status files +.It Pa /var/spool/uucp/TM./ +File transfer temp directory +.It Pa /var/spool/uucp/X./ +Incoming execution file directory +.It Pa /var/spool/uucppublic +Public access directory +.El +.Sh SEE ALSO +.Xr uucp 1 , +.Xr uuq 1 , +.Xr uux 1 , +.Xr L-devices 5 , +.Xr L-dialcodes 5 , +.Xr L.aliases 5 , +.Xr L.cmds 5 , +.Xr L.sys 5 , +.Xr uuclean 8 , +.Xr uupoll 8 , +.Xr uusnap 8 , +.Xr uuxqt 8 +.Rs +.%A D. A. Nowitz +.%A M. E. Lesk +.%T "A Dial-Up Network of UNIX Systems" +.Re +.Rs +.%A D. A. Nowitz +.%T "Uucp Implementation Description" +.Re +.Sh HISTORY +The +.Nm +command appeared in +.Bx 4.3 . diff --git a/usr/src/usr.bin/uucp/uuclean/uuclean.8 b/usr/src/usr.bin/uucp/uuclean/uuclean.8 index 9d7e8a3726..0e52721c8c 100644 --- a/usr/src/usr.bin/uucp/uuclean/uuclean.8 +++ b/usr/src/usr.bin/uucp/uuclean/uuclean.8 @@ -1,57 +1,64 @@ -.\" Copyright (c) 1983 Regents of the University of California. -.\" All rights reserved. The Berkeley software License Agreement -.\" specifies the terms and conditions for redistribution. +.\" Copyright (c) 1983, 1991 Regents of the University of California. +.\" All rights reserved. .\" -.\" @(#)uuclean.8 6.5 (Berkeley) %G% +.\" %sccs.include.redist.man% .\" -.TH UUCLEAN 8 "" -.UC 5 -.SH NAME -uuclean \- uucp spool directory clean-up -.SH SYNOPSIS -.B /usr/lib/uucp/uuclean -[ -.B -m -] [ -.BI -n time -] [ -.BI -p pre -] -.SH DESCRIPTION -.I Uuclean +.\" @(#)uuclean.8 6.6 (Berkeley) %G% +.\" +.Dd +.Dt UUCLEAN 8 +.Os BSD 4.2 +.Sh NAME +.Nm uuclean +.Nd uucp spool directory clean +.Ndup +.Sh SYNOPSIS +.Nm uuclean +.Op Fl d Ns Ar subdirectory +.Op Fl m +.Op Fl n Ns Ar time +.Op Fl p Ns Ar pre +.Sh DESCRIPTION +.Xr Uuclean will scan the spool directory for files with the specified prefix and delete all those which are older than the specified number of hours. -.PP +.Pp The following options are available. -.TP 8 -.BI \-p pre -Scan for files with -.I pre -as the file prefix. -Up to 10 -.B \-p -arguments may be specified. -.TP -.BI \-n time +.Bl -tag -width Ds +.It Fl d Ns Ar subdirectory +Only the specified subdirectory will be cleaned. +.It Fl m +Send mail to the owner of the file +when it is deleted. +.It Fl n Ns Ar time Files whose age is more than -.I time +.Ar time hours will be deleted if the prefix test is satisfied. (default time is 72 hours) -.TP 8 -.B \-m -Send mail to the owner of the file -when it is deleted. -.TP -.BI \-d subdirectory -Only the specified subdirectory will be cleaned. -.PP +.It Fl p Ns Ar pre +Scan for files with +.Ar pre +as the file prefix. +Up to 10 +.Fl p +arguments may be specified. +.El +.Pp This program will typically be run daily by -.IR cron (8). -.SH FILES -.TP 22 -/var/spool/uucp +.Xr cron 8 . +.Sh FILES +.Bl -tag -width /var/spool/uucp +.It Pa /var/spool/uucp Spool directory -.SH SEE ALSO -uucp(1), uux(1), uucico(8) +.El +.Sh SEE ALSO +.Xr uucp 1 , +.Xr uux 1 , +.Xr uucico 8 +.Sh HISTORY +The +.Nm +command appeared in +.Bx 4.2 . diff --git a/usr/src/usr.bin/uucp/uupoll/uupoll.8 b/usr/src/usr.bin/uucp/uupoll/uupoll.8 index bd8f792152..e67e948456 100644 --- a/usr/src/usr.bin/uucp/uupoll/uupoll.8 +++ b/usr/src/usr.bin/uucp/uupoll/uupoll.8 @@ -1,75 +1,85 @@ -.\" Copyright (c) 1986 Regents of the University of California. -.\" All rights reserved. The Berkeley software License Agreement -.\" specifies the terms and conditions for redistribution. +.\" Copyright (c) 1986, 1991 Regents of the University of California. +.\" All rights reserved. .\" -.\" @(#)uupoll.8 6.4 (Berkeley) %G% +.\" %sccs.include.redist.man% .\" -.TH UUPOLL 8 "" -.UC 6 -.SH NAME -uupoll \- poll a remote \s-1UUCP\s+1 site -.SH SYNOPSIS -.B uupoll -[ -.BI \-g grade -] [ -.B \-n -] -.I system -.SH DESCRIPTION -.I Uupoll +.\" @(#)uupoll.8 6.5 (Berkeley) %G% +.\" +.Dd +.Dt UUPOLL 8 +.Os BSD 4.3 +.Sh NAME +.Nm uupoll +.Nd poll a remote +.Tn UUCP +site +.Sh SYNOPSIS +.Nm uupoll +.Op Fl g Ns Ar grade +.Op Fl n +.Ar system +.Sh DESCRIPTION +.Nm Uupoll is used to force a poll of a remote system. It queues a null job for the remote system and then invokes -.IR uucico (8). -.PP +.Xr uucico 8 . +.Pp The following options are available: -.TP 8 -.BI \-g grade +.Bl -tag -width Fl +.It Fl g Ns Ar grade Only send jobs of grade -.I grade +.Ar grade or higher on this call. -.TP 8 -.B \-n +.It Fl n Queue the null job, but do not invoke -.IR uucico . -.PP -.I Uupoll +.Xr uucico . +.El +.Pp +.Nm Uupoll is usually run by -.IR cron (5) +.Xr cron 5 or by a user who wants to hurry a job along. A typical entry in -.I crontab +.Em crontab could be: -.PP -.nf - 0 0,8,16 * * * daemon /usr/bin/uupoll ihnp4 - 0 4,12,20 * * * daemon /usr/bin/uupoll ucbvax -.fi +.Bd -literal +0 0,8,16 * * * daemon /usr/bin/uupoll ihnp4 +0 4,12,20 * * * daemon /usr/bin/uupoll ucbvax +.Ed +.Pp This will poll -.B ihnp4 +.Em ihnp4 at midnight, 0800, and 1600, and -.B ucbvax +.Em ucbvax at 0400, noon, and 2000. -.PP +.Pp If the local machine is already running -.I uucico +.Xr uucico every hour and has a limited number of outgoing modems, a more elegant approach might be: -.PP -.nf - 0 0,8,16 * * * daemon /usr/bin/uupoll -n ihnp4 - 0 4,12,20 * * * daemon /usr/bin/uupoll -n ucbvax - 5 * * * * daemon /usr/lib/uucp/uucico -r1 -.fi +.Bd -literal +0 0,8,16 * * * daemon /usr/bin/uupoll -n ihnp4 +0 4,12,20 * * * daemon /usr/bin/uupoll -n ucbvax +5 * * * * daemon /usr/lib/uucp/uucico -r1 +.Ed +.Pp This will queue null jobs for the remote sites at the top of hour; they will be processed by -.I uucico +.Xr uucico when it runs five minutes later. -.SH FILES -.ta \w'/var/spool/uucp/ 'u -.nf -/usr/lib/uucp/ UUCP internal files/utilities -/var/spool/uucp/ Spool directory -.fi -.SH SEE ALSO -uucp(1), uux(1), uucico(8) +.Sh FILES +.Bl -tag -width /usr/lib/uucp/UUCP -compact +.It Pa /usr/lib/uucp/UUCP +internal files/utilities +.It Pa /var/spool/uucp/ +Spool directory +.El +.Sh SEE ALSO +.Xr uucp 1 , +.Xr uux 1 , +.Xr uucico 8 +.Sh HISTORY +The +.Nm +command appeared in +.Bx 4.3 . diff --git a/usr/src/usr.bin/uucp/uusnap/uusnap.8 b/usr/src/usr.bin/uucp/uusnap/uusnap.8 index ffadd6e2b8..bd10bca27b 100644 --- a/usr/src/usr.bin/uucp/uusnap/uusnap.8 +++ b/usr/src/usr.bin/uucp/uusnap/uusnap.8 @@ -1,32 +1,54 @@ -.\" Copyright (c) 1983 Regents of the University of California. -.\" All rights reserved. The Berkeley software License Agreement -.\" specifies the terms and conditions for redistribution. +.\" Copyright (c) 1983, 1991 Regents of the University of California. +.\" All rights reserved. .\" -.\" @(#)uusnap.8 6.3 (Berkeley) %G% +.\" %sccs.include.redist.man% .\" -.TH UUSNAP 8 "" -.UC 5 -.SH NAME -uusnap \- show snapshot of the UUCP system -.SH SYNOPSIS -.B uusnap -.SH DESCRIPTION -.I Uusnap -displays in tabular format a synopsis of the current UUCP +.\" @(#)uusnap.8 6.4 (Berkeley) %G% +.\" +.Dd +.Dt UUSNAP 8 +.Os BSD 4.2 +.Sh NAME +.Nm uusnap +.Nd show snapshot of the +.Tn UUCP +system +.Sh SYNOPSIS +.Nm uusnap +.Sh DESCRIPTION +.Nm Uusnap +displays in tabular format a synopsis of the current +.Tn UUCP situation. The format of each line is as follows: -.PP -.ti +10 +.Bd -literal -offset indent -compact + site N Cmds N Data N Xqts Message -.PP + +.Ed Where "site" is the name of the site with work, "N" is a count of each of the three possible types of work (command, data, or remote execute), and "Message" is the current status message for that -site as found in the STST file. -.PP -Included in "Message" may be the time left before UUCP can re-try the -call, and the count of the number of times that UUCP has tried +site as found in the +.Tn STST +file. +.Pp +Included in "Message" may be the time left before +.Tn UUCP +can re-try the +call, and the count of the number of times that +.Tn UUCP +has tried (unsuccessfully) to reach the site. -.SH SEE ALSO -uucp(1), uux(1), uuq(1), uucico(8) -.br -.I "UUCP Implementation Guide" +.Sh SEE ALSO +.Xr uucp 1 , +.Xr uux 1 , +.Xr uuq 1 , +.Xr uucico 8 +.Rs +.%T "UUCP Implementation Guide" +.Re +.Sh HISTORY +The +.Nm +command appeared in +.Bx 4.2 . diff --git a/usr/src/usr.bin/uucp/uuxqt/uuxqt.8 b/usr/src/usr.bin/uucp/uuxqt/uuxqt.8 index 1754353227..c95a60bd62 100644 --- a/usr/src/usr.bin/uucp/uuxqt/uuxqt.8 +++ b/usr/src/usr.bin/uucp/uuxqt/uuxqt.8 @@ -1,51 +1,78 @@ -.\" Copyright (c) 1980 Regents of the University of California. -.\" All rights reserved. The Berkeley software License Agreement -.\" specifies the terms and conditions for redistribution. +.\" Copyright (c) 1980, 1991 Regents of the University of California. +.\" All rights reserved. .\" -.\" @(#)uuxqt.8 6.3 (Berkeley) %G% +.\" %sccs.include.redist.man% .\" -.TH UUXQT 8 "" -.UC 6 -.SH NAME -uuxqt \- \s-1UUCP\s+1 execution file interpreter -.SH SYNOPSIS -.B /usr/lib/uucp/uuxqt -[ -.BI \-x debug -] -.SH DESCRIPTION -.I Uuxqt +.\" @(#)uuxqt.8 6.4 (Berkeley) %G% +.\" +.Dd +.Dt UUXQT 8 +.Os BSD 4.3 +.Sh NAME +.Nm uuxqt +.Nd +.Tn UUCP +execution file interpreter +.Sh SYNOPSIS +.Nm uuxqt +.Op Fl x Ar debug +.Sh DESCRIPTION +.Nm Uuxqt interprets -.I "execution files" +.Em execution files created on a remote system via -.IR uux (1) +.Xr uux 1 and transferred to the local system via -.IR uucico (8). +.Xr uucico 8 . When a user uses -.I uux +.Xr uux to request remote command execution, it is -.I uuxqt +.Nm uuxqt that actually executes the command. +.Pp +Option availble: +.Bl -tag -width Ar +.It Fl x Ns Ar debug Normally, -.I uuxqt +.Nm uuxqt is forked from -.I uucico +.Xr uucico 8 to process queued execution files; -for debugging, it may also be run manually by the \s-1UUCP\s+1 administrator. -.PP -.I Uuxqt -runs in its own subdirectory, -.IR /var/spool/uucp/XTMP . +for debugging, it may also be run manually by the +.Tn UUCP +administrator. +.El +.Pp +.Nm Uuxqt +runs in its own subdirectory +.Pa /var/spool/uucp/XTMP . It copies intermediate files to this directory when necessary. -.SH FILES -.ta \w'/var/spool/uucp/LCK/LCK.XQT 'u -.nf -/usr/lib/uucp/L.cmds Remote command permissions list -/usr/lib/uucp/USERFILE Remote directory tree permissions list -/var/spool/uucp/LOGFILE UUCP system activity log -/var/spool/uucp/LCK/LCK.XQT \fIUuxqt\fP lock file -/var/spool/uucp/X./ Incoming execution file directory -/var/spool/uucp/XTMP \fIUuxqt\fP running directory -.fi -.SH SEE ALSO -uucp(1), uux(1), L.cmds(5), USERFILE(5), uucico(8) +.Sh FILES +.Bl -tag -width /var/spool/uucp/LCK/LCK.XQT -compact +.It Pa /usr/lib/uucp/L.cmds +Remote command permissions list +.It Pa /usr/lib/uucp/USERFILE +Remote directory tree permissions list +.It Pa /var/spool/uucp/LOGFILE +.Tn UUCP +system activity log +.It Pa /var/spool/uucp/LCK/LCK.XQT +.Nm Uuxqt +lock file +.It Pa /var/spool/uucp/X./ +Incoming execution file directory +.It Pa /var/spool/uucp/XTMP +.Nm Uuxqt +running directory +.El +.Sh SEE ALSO +.Xr uucp 1 , +.Xr uux 1 , +.Xr L.cmds 5 , +.Xr USERFILE 5 , +.Xr uucico 8 +.Sh HISTORY +The +.Nm +command appeared in +.Bx 4.3 . diff --git a/usr/src/usr.sbin/ac/ac.8 b/usr/src/usr.sbin/ac/ac.8 index 57a9694c9b..332a5afe55 100644 --- a/usr/src/usr.sbin/ac/ac.8 +++ b/usr/src/usr.sbin/ac/ac.8 @@ -1,65 +1,81 @@ -.\" Copyright (c) 1980 Regents of the University of California. -.\" All rights reserved. The Berkeley software License Agreement -.\" specifies the terms and conditions for redistribution. +.\" Copyright (c) 1980, 1991 Regents of the University of California. +.\" All rights reserved. .\" -.\" @(#)ac.8 6.2 (Berkeley) %G% +.\" %sccs.include.redist.man% .\" -.TH AC 8 "" -.UC 4 -.SH NAME -ac \- login accounting -.SH SYNOPSIS -.B ac -[ -.B \-w -wtmp ] [ -.B \-p -] [ -.B \-d -] [ people ] ... -.SH DESCRIPTION -.I Ac -produces a printout giving -connect time -for each user who has logged in -during the life of the current -.I wtmp -file. -A total is also produced. -.B \-w -is used to specify an alternate -.IR wtmp "" -file. -.B \-p -prints individual totals; without this option, -only totals are printed. -.B \-d -causes a printout for each midnight to midnight -period. -Any -.I people -will limit the -printout to only the specified login names. -If no -.IR wtmp "" -file is given, -.I /var/log/wtmp -is used. -.PP -The accounting file -.I /var/log/wtmp -is maintained by -.I init +.\" @(#)ac.8 6.3 (Berkeley) %G% +.\" +.Dd +.Dt AC 8 +.Os BSD 4 +.Sh NAME +.Nm ac +.Nd display connect time accounting +.Sh SYNOPSIS +.Nm ac +.Op Fl d +.Op Fl p +.Op Fl w Ar file +.Op Ar users ... +.Sh DESCRIPTION +If the file +.Pa /var/log/wtmp +exists, +a record of individual +login and logout times are written to it by +.Xr init 8 and -.I login. -Neither of these programs creates the file, -so if it does not exist -no connect-time accounting is done. -To start accounting, it should be created with length 0. -On the other hand if the file is left undisturbed it will -grow without bound, so periodically any information -desired should be collected and the file truncated. -.SH FILES -/var/log/wtmp -.SH "SEE ALSO" -init(8), sa(8), login(1), utmp(5). +.Xr login 8 +respectively. +The program +.Nm ac +examines these +records and writes the accumulated connect time for all logins to the +standard output. +.Pp +Options available: +.Bl -tag -width people +.It Fl d +Display the connect times in 24 hour chunks. +.It Fl p +Display individual user totals. +.It Fl w Ar file +Read raw connect time data from +.Ar file +instead of the default file +.Pa /var/log/wtmp . +.It Ar users ... +Display totals for the given indiviuals +only. +.El +.Pp +If no arguments are given, +.Nm +displays the total amount of login time for all active accounts on the +system. +.Pp +The default +.Pa wtmp +file is an infinitely increasing file +unless frequently truncated. This is normally +done by the daily daemon scripts scheduled by +.Xr cron 8 +which rename and rotate the +.Pa wtmp +files before truncating them (and keeping about a weeks worth on hand). +No login times are collected however, if the file does not exist. +.Sh FILES +.Bl -tag -width /var/log/wtmp.[0-7] -compact +.It Pa /var/log/wtmp +.It Pa /var/log/wtmp.[0-7] +rotated files +.El +.Sh SEE ALSO +.Xr init 8 , +.Xr sa 8 , +.Xr login 1 , +.Xr utmp 5 . +.Sh HISTORY +A +.Nm +command appeared in Version 6 AT&T UNIX. diff --git a/usr/src/usr.sbin/amd/amd/amd.8 b/usr/src/usr.sbin/amd/amd/amd.8 index 20689a2624..df864fe0b5 100644 --- a/usr/src/usr.sbin/amd/amd/amd.8 +++ b/usr/src/usr.sbin/amd/amd/amd.8 @@ -1,212 +1,219 @@ -.\" $Id: amd.8,v 5.2 90/06/23 22:21:12 jsp Rel $ .\" Copyright (c) 1989 Jan-Simon Pendry .\" Copyright (c) 1989 Imperial College of Science, Technology & Medicine -.\" Copyright (c) 1989 The Regents of the University of California. +.\" Copyright (c) 1989, 1991 The Regents of the University of California. .\" All rights reserved. .\" .\" This code is derived from software contributed to Berkeley by .\" Jan-Simon Pendry at Imperial College, London. .\" -.\" %sccs.include.redist.man% +.\" %sccs.include.redist.man% .\" -.\" @(#)amd.8 5.1 (Berkeley) %G% +.\" @(#)amd.8 5.2 (Berkeley) %G% .\" -.TH AMD 8 "" -.SH NAME -amd \- automatically mount file systems -.SH SYNOPSIS -.B amd -[ -.B \-nprv -] [ -.BI \-a " mount_point" -] [ -.BI \-c " duration" -] [ -.BI \-d " domain" -] [ -.BI \-k " kernel-arch" -] [ -.BI \-l " logfile" -] [ -.BI \-t " interval.interval" -] [ -.BI \-w " interval" -] [ -.BI \-x " log-option" -] [ -.BI \-y " YP-domain" -] [ -.BI \-C " cluster-name" -] [ -.BI \-D " option" -] -[ -.I directory -.I mapname -.RI [ " \-map-options " ] -] .\|.\|. -.SH DESCRIPTION -.B Amd +.Dd +.Dt AMD 8 +.Os +.Sh NAME +.Nm amd +.Nd automatically mount file systems +.Sh SYNOPSIS +.Nm amd +.Op Fl nprv +.Op Fl a Ar mount_point +.Op Fl c Ar duration +.Op Fl d Ar domain +.Bk -words +.Op Fl k Ar kernel-arch +.Ek +.Op Fl l Ar logfile +.Op Fl t Ar interval.interval +.Bk -words +.Op Fl w Ar interval +.Ek +.Op Fl x Ar log-option +.Op Fl y Ar YP-domain +.Bk -words +.Op Fl C Ar cluster-name +.Ek +.Op Fl D Ar option +.Oo +.Ar directory mapname +.Op Fl map-options +.Oc +.Ar ... +.Sh DESCRIPTION +.Nm Amd is a daemon that automatically mounts filesystems whenever a file or directory within that filesystem is accessed. Filesystems are automatically unmounted when they -appear to have become quiescent. -.LP -.B Amd +appear to be quiescent. +.Pp +.Nm Amd has been designed as a value-added replacement for the SunOS 4 -.IR automount (8) +.Xr automount 8 program. Considerable design effort has been expended in making -.B amd +.Nm amd robust in the face of -.SM NFS +.Tn NFS servers going down. -.B Amd +.Nm Amd operates by attaching itself as an -.SM NFS +.Tn NFS server to each of the specified -.IB directories . +.Ar directories . Lookups within the specified directories are handled by -.BR amd , +.Nm amd , which uses the map contained in -.I mapname +.Ar mapname to determine how to resolve the lookup. Generally, this will be a host name, some filesystem information and some mount options for the given filesystem. -.SH OPTIONS -.TP -.B \-n -Normalize hostnames. -The name refered to by ${rhost} are normalized relative to the -host database before being used. The effect is to translate -aliases into ``official'' names. -.TP -.B \-p -Print PID. -Outputs the process-id of -.B amd -to standard output where it can be saved into a file. -.TP -.B \-r -Restart existing mounts. -.B Amd -will scan the mount file table to determine which filesystems -are currently mounted. Whenever one of these would have -been auto-mounted, -.B amd -.I inherits -it. -.TP -.B \-v -Version. Displays version and configuration information on standard error. -If you send a bug report, this should be used to determine -which version of -.B amd -you are using. -.TP -.BI \-a " temporary-directory" +.Sh OPTIONS +.Bl -tag -width Ds +.It Fl a Ar temporary-directory Specify an alternative location for the real mount points. The default is -.BR /a . -.TP -.BI \-c " duration" +.Pa /a . +.It Fl c Ar duration Specify a -.IR duration , +.Ar duration , in seconds, that a looked up name remains cached when not in use. The default is 5 minutes. -.TP -.BI \-d " domain" +.It Fl d Ar domain Specify the local domain name. If this option is not given the domain name is determined from the hostname. -.TP -.BI \-k " kernel-arch" +.It Fl k Ar kernel-arch Specifies the kernel architecture. This is used solely to set the ${karch} selector. -.TP -.BI \-l " logfile" +.It Fl l Ar logfile Specify a logfile in which to record mount and unmount events. If -.I logfile +.Ar logfile is the string -.B syslog -then the log messages will be sent to the system log daemon by -.IR syslog (3). +.Em syslog , +the log messages will be sent to the system log daemon by +.Xr syslog 3 . This is only available on certain systems (e.g. -.I not -.SM HP-UX +.Em not +.Tn HP-UX and early versions of Ultrix). -.TP -.BI \-t " interval.interval" +.It Fl n +Normalize hostnames. +The name refered to by ${rhost} are normalized relative to the +host database before being used. The effect is to translate +aliases into ``official'' names. +.It Fl p +Print +.Em PID . +Outputs the process-id of +.Nm amd +to standard output where it can be saved into a file. +.It Fl r +Restart existing mounts. +.Nm Amd +will scan the mount file table to determine which filesystems +are currently mounted. Whenever one of these would have +been auto-mounted, +.Nm amd +.Em inherits +it. +.It Fl t Ar interval.interval Specify the -.IR interval , -in tenths of a second, between NFS/RPC/UDP retries. +.Ar interval , +in tenths of a second, between +.Tn NFS/RPC/UDP +retries. The default is 0.8 seconds. The second values alters the restransmit counter. Useful defaults are supplied if either or both values are missing. -.TP -.BI \-w " interval" +.It Fl v +Version. Displays version and configuration information on standard error. +If you send a bug report, this should be used to determine +which version of +.Nm amd +you are using. +.It Fl w Ar interval Specify an -.IR interval , +.Ar interval , in seconds, between attempts to dismount filesystems that have exceeded their cached times. The default is 2 minutes. -.TP -.BI \-y " domain" -Specify an alternative YP domain from which to fetch the YP maps. +.It Fl y Ar domain +Specify an alternative +.Tn YP +domain from which to fetch the +.Tn YP +maps. The default is the system domain name. -.TP -.BI \-x " options" +.It Fl x Ar options Specify run-time logging options. The options are a comma separated list chosen from: fatal, error, user, warn, info, all. -.TP -.BI \-D " option" +.It Fl D Ar option Select from a variety of debug options. Prefixing an option with the strings -.B no +.Em no reverses the effect of that option. Options are cumulative. The most useful option is -.BR all . +.Ar all . +.El +.Pp Since -.I \-D +.Fl D is only used for debugging other options are not documented here: -the current supported set of options is listed by the \-v option +the current supported set of options is listed by the +.Fl v +option and a fuller description is available in the program source. -.SH FILES -.PD 0 -.TP 5 -.B /a +.Sh FILES +.Bl -tag -width /axx +.It Pa /a directory under which filesystems are dynamically mounted -.PD -.SH CAVEATS +.El +.Sh CAVEATS Some care may be required when creating a mount map. -.LP -Symbolic links on an NFS filesystem are incredibly inefficient. -Their interpolations are not cached by the kernel and each time a symlink is +.Pp +Symbolic links on an +.Tn NFS +filesystem are incredibly inefficient. +Their interpolations are not cached by the kernel and each time a symbolic +link is encountered during a -.I lookuppn -translation it costs an RPC call to the NFS server. +.Em lookuppn +translation it costs an +.Tn RPC +call to the +.Tn NFS +server. It would appear that a large improvement in real-time performance could be gained by adding a cache somewhere. -Replacing symlinks with a suitable incarnation of the auto-mounter +Replacing +.Xr symlinks 2 +with a suitable incarnation of the auto-mounter results in a large real-time speedup, but also causes a large number of process context switches. -.LP +.Pp A weird imagination is most useful to gain full advantage of all the features. -.SH "SEE ALSO" -.BR amq (8), -.BR domainname (1), -.BR hostname (1), -.BR automount (8), -.BR mount (8), -.BR umount (8), -.BR mtab (5), -.LP -.I "Amd \- An Automounter" -.SH AUTHOR -Jan-Simon Pendry , Department of Computing, Imperial College, London, UK. +.Sh SEE ALSO +.Xr amq 8 , +.Xr domainname 1 , +.Xr hostname 1 , +.Xr automount 8 , +.Xr mount 8 , +.Xr umount 8 , +.Xr mtab 5 , +.Rs +.%T Amd \- An Automounter +.Re +.Sh AUTHOR +.An Jan-Simon Pendry +, Department of Computing, Imperial College, London, UK. +.Sh HISTORY +The +.Nm +.At diff --git a/usr/src/usr.sbin/amd/amq/amq.8 b/usr/src/usr.sbin/amd/amq/amq.8 index 68affc3bfe..842ebb8938 100644 --- a/usr/src/usr.sbin/amd/amq/amq.8 +++ b/usr/src/usr.sbin/amd/amq/amq.8 @@ -1,94 +1,92 @@ -.\" $Id: amq.8,v 5.2 90/06/23 22:21:16 jsp Rel $ .\" Copyright (c) 1990 Jan-Simon Pendry .\" Copyright (c) 1990 Imperial College of Science, Technology & Medicine -.\" Copyright (c) 1990 The Regents of the University of California. +.\" Copyright (c) 1990, 1991 The Regents of the University of California. .\" All rights reserved. .\" .\" This code is derived from software contributed to Berkeley by .\" Jan-Simon Pendry at Imperial College, London. -.\" .\" %sccs.include.redist.man% .\" -.\" @(#)amq.8 5.1 (Berkeley) %G% +.\" @(#)amq.8 5.2 (Berkeley) %G% .\" -.TH AMQ 8 "" -.SH NAME -amq \- automounter query tool -.SH SYNOPSIS -.B amq -[ -.BI \-h " hostname" -] [ -.B \-f -] [ -.B \-m -] [ -.B \-s -] [ -.B \-u -] -[ -.I directory -] .\|.\|. -.SH DESCRIPTION -.B Amq +.Dd +.Dt AMQ 8 +.Os +.Sh NAME +.Nm amq +.Nd automounter query tool +.Sh SYNOPSIS +.Nm amq +.Op Fl f +.Op Fl h Ar hostname +.Op Fl m +.Op Fl s +.Op Fl u +.Op Ar directory +.Ar ... +.Sh DESCRIPTION +.Nm Amq provides a simple way of determining the current state of -.B amd +.Xr amd 8 program. Communication is by -.SM RPC. +.Tn RPC . Three modes of operation are supported by the current protocol. By default a list of mount points and auto-mounted filesystems is output. An alternative host can be specified using the -.I \-h +.Fl h option. -.LP +.Pp If directory names are given, as output by default, then per-filesystem information is displayed. -.SH OPTIONS -The -.I \-h -option specifies an alternate host to query. +.Sh OPTIONS +.Bl -tag -width Ds +.It Fl f +Request automounter to flush the internal +mount map cache. +.It Fl h Ar hostname +Query alternate host +.Ar hostname . By default the local host is used. In an -.SM HP-UX +.Tn HP-UX cluster, the root server is queried by default, since that is the system on which the automounter is normally run. -.LP -The -.I \-f -option asks the automounter to flush the internal -mount map cache. -The -.I \-m -option asks the automounter to provide a list of mounted filesystems, +.It Fl m +Request automounter to provide a list of mounted filesystems, including the number of references to each filesystem and any error which occured while mounting. -The -.I \-s -option asks the automounter to provide system-wide mount statistics. -.LP -The -.I \-u -option asks the automounter to unmount the named filesystems +.It Fl s +Request automounter to provide system-wide mount statistics. +.It Fl u +Request automounter to unmount the named filesystems instead of providing information about them. Unmounts are requested, not forced. They merely cause the mounted filesystem to timeout, which will be picked up by -.BR amd 's +.Xr amd Ns \'s main scheduler thus causing the normal timeout action to be taken. -.SH FILES -.PD 0 -.TP 20 -.B amq.x -.SM RPC +.El +.Sh FILES +.Bl -tag -width amq.xxxxx -compact +.Bl -tag -width Ds +.It Pa amq.x +.Tn RPC protocol description. -.SH CAVEATS -.B Amq +.El +.Sh CAVEATS +.Nm Amq uses a Sun registered -.SM RPC +.Tn RPC program number (300019 decimal) which may not -be in the /etc/rpc database. -.SH "SEE ALSO" -.BR amd (8) -.SH AUTHOR -Jan-Simon Pendry , Department of Computing, Imperial College, London, UK. +be in the +.Pa /etc/rpc +database. +.Sh SEE ALSO +.Xr amd 8 +.Sh AUTHOR +.An Jan-Simon Pendry +, Department of Computing, Imperial College, London, UK. +.Sh HISTORY +The +.Nm +.At diff --git a/usr/src/usr.sbin/arp/arp.8 b/usr/src/usr.sbin/arp/arp.8 index 1bc89f26bc..e3f7ce44c9 100644 --- a/usr/src/usr.sbin/arp/arp.8 +++ b/usr/src/usr.sbin/arp/arp.8 @@ -1,102 +1,109 @@ -.\" Copyright (c) 1985 The Regents of the University of California. +.\" Copyright (c) 1985, 1991 The Regents of the University of California. .\" All rights reserved. .\" .\" %sccs.include.redist.man% .\" -.\" @(#)arp.8 6.4 (Berkeley) %G% +.\" @(#)arp.8 6.5 (Berkeley) %G% .\" -.TH ARP 8 "" -.UC 6 -.SH NAME -arp \- address resolution display and control -.SH SYNOPSIS -.B arp -.I hostname -.br -.B arp -a -[ -.I vmunix -] [ -.I kmem -] -.br -.B arp -d -.I hostname -.br -.B arp -s -.I hostname ether_addr -[ -.B temp -] [ -.B pub -] [ -.B trail -] -.br -.B arp -f -.I filename -.SH DESCRIPTION +.Dd +.Dt ARP 8 +.Os BSD 4.3 +.Sh NAME +.Nm arp +.Nd address resolution display and control +.Sh SYNOPSIS +.Nm arp +.Ar hostname +.Nm arp +.Fl a +.Op Ar vmunix +.Op Ar kmem +.Nm arp +.Fl d Ar hostname +.Nm arp +.Fl s Ar hostname ether_addr +.Op Ar temp +.Op Ar pub +.Op Ar trail +.Nm arp +.Fl f Ar filename +.Sh DESCRIPTION The -.I arp +.Nm arp program displays and modifies the Internet-to-Ethernet address translation tables used by the address resolution protocol -.RI ( arp (4p)). -.LP -With no flags, the program displays the current ARP entry for -.I hostname. +.Pq Xr arp 4 . +With no flags, the program displays the current +.Tn ARP +entry for +.Ar hostname . The host may be specified by name or by number, using Internet dot notation. -With the -.B -a -flag, the program displays all of the current ARP entries by reading the table +.Pp +Available options: +.Bl -tag -width Ds +.It Fl a +The program displays all of the current +.Tn ARP +entries by reading the table from the file -.I kmem +.Ar kmem (default /dev/kmem) based on the kernel file -.I vmunix -(default /vmunix). -.LP -With the -.B -d -flag, a super-user may delete an entry for the host called -.I hostname. -.LP -The -.B -s -flag is given to create an ARP entry for the host called -.I hostname +.Ar vmunix +(default +.Pa /vmunix ) . +.It Fl d +A super-user may delete an entry for the host called +.Ar hostname +with the +.Fl d +flag. +.It Fl s Ar hostname ether_addr +Create an +.Tn ARP +entry for the host called +.Ar hostname with the Ethernet address -.I ether_addr. +.Ar ether_addr . The Ethernet address is given as six hex bytes separated by colons. The entry will be permanent unless the word -.B temp +.Ar temp is given in the command. If the word -.B pub +.Ar pub is given, the entry will be "published"; i.e., this system will -act as an ARP server, +act as an +.Tn ARP +server, responding to requests for -.I hostname +.Ar hostname even though the host address is not its own. The word -.B trail +.Ar trail indicates that trailer encapsulations may be sent to this host. -.LP -The -.B -f -flag causes the file -.I filename -to be read and multiple entries to be set in the ARP tables. Entries +.It Fl f +Causes the file +.Ar filename +to be read and multiple entries to be set in the +.Tn ARP +tables. Entries in the file should be of the form -.IP -.I hostname ether_addr -[ -.B temp -] [ -.B pub -] [ -.B trail -] -.LP +.Pp +.Bd -filled -offset indent -compact +.Ar hostname ether_addr +.Op Ar temp +.Op Ar pub +.Op Ar trail +.Ed +.Pp with argument meanings as given above. -.SH "SEE ALSO" -inet(3), arp(4), ifconfig(8) +.El +.Sh SEE ALSO +.Xr inet 3 , +.Xr arp 4 , +.Xr ifconfig 8 +.Sh HISTORY +The +.Nm +command appeared in +.Bx 4.3 . diff --git a/usr/src/usr.sbin/bad144/bad144.8 b/usr/src/usr.sbin/bad144/bad144.8 index 5b4c904959..d952a8a0b0 100644 --- a/usr/src/usr.sbin/bad144/bad144.8 +++ b/usr/src/usr.sbin/bad144/bad144.8 @@ -1,59 +1,88 @@ -.\" Copyright (c) 1980, 1988 Regents of the University of California. -.\" All rights reserved. The Berkeley software License Agreement -.\" specifies the terms and conditions for redistribution. +.\" Copyright (c) 1980, 1988, 1991 Regents of the University of California. +.\" All rights reserved. .\" -.\" @(#)bad144.8 6.6 (Berkeley) %G% +.\" %sccs.include.redist.man% .\" -.TH BAD144 8 "" -.UC 4 -.SH NAME -bad144 \- read/write dec standard 144 bad sector information -.SH SYNOPSIS -.B bad144 -[ -.B \-f -] [ -.B \-c -] [ -.B \-v -] -disk -[ sno [ -bad ... -] ] -.br -.B bad144 -.B \-a -[ -.B \-f -] [ -.B \-c -] [ -.B \-v -] -disk -[ -bad ... -] -.SH DESCRIPTION -.I Bad144 +.\" @(#)bad144.8 6.7 (Berkeley) %G% +.\" +.Dd +.Dt BAD144 8 +.Os BSD 4 +.Sh NAME +.Nm bad144 +.Nd read/write dec standard 144 bad sector information +.Sh SYNOPSIS +.Nm bad144 +.Op Fl c +.Op Fl f +.Op Fl v +.Ar disk +.Oo +.Ar sno +.Op Ar bad ... +.Oc +.Nm bad144 +.Fl a +.Op Fl c +.Op Fl f +.Op Fl v +.Ar disk +.Op Ar bad ... +.Sh DESCRIPTION +.Nm Bad144 can be used to inspect the information stored on a disk that is used by -the disk drivers to implement bad sector forwarding. The format of -the information is specified by DEC standard 144, as follows. -.PP +the disk drivers to implement bad sector forwarding. +.Pp +Available options: +.Pp +.Bl -tag -width Ds +.It Fl a +The argument list consists of new bad sectors to be added to an existing +list. +The new sectors are sorted into the list, +which must have been in order. +Replacement sectors are moved to accommodate the additions; +the new replacement sectors are cleared. +.It Fl c +Forces an attempt to copy the old sector to the replacement, +and may be useful when replacing an unreliable sector. +.It Fl f +For a RP06, RM03, RM05, Fujitsu Eagle, +or +.Tn SMD +disk on a Massbus, the +.Fl f +option may be used to mark the new bad sectors as ``bad'' +by reformatting them as unusable sectors. +This option is +.Em required unless +the sectors have already been marked bad, +or the system will not be notified that it should use the replacement sector. +This option may be used while running multiuser; it is no longer necessary +to perform format operations while running single-user. +.It Fl v +The entire process is described as it happens in gory detail if +.Fl v +(verbose) is given. +.El +.Pp +The format of +the information is specified by +.Tn DEC +standard 144, as follows. The bad sector information is located in the first 5 even numbered sectors of the last track of the disk pack. There are five identical copies of the information, described by the -.I dkbad +.Ar dkbad structure. -.PP +.Pp Replacement sectors are allocated starting with the first sector before the bad sector information and working backwards towards the beginning of the disk. A maximum of 126 bad sectors are supported. The position of the bad sector in the bad sector table determines the replacement sector to which it corresponds. The bad sectors must be listed in ascending order. -.PP +.Pp The bad sector information and replacement sectors are conventionally only accessible through the ``c'' file system partition of the disk. If that partition is used for a file system, the user is responsible for @@ -61,89 +90,71 @@ making sure that it does not overlap the bad sector information or any replacement sectors. Thus, one track plus 126 sectors must be reserved to allow use of all of the possible bad sector replacements. -.PP +.Pp The bad sector structure is as follows: -.PP -.ta .75i 1.5i 3.5i -.nf +.Bd -literal struct dkbad { - long bt_csn; /* cartridge serial number */ - u_short bt_mbz; /* unused; should be 0 */ - u_short bt_flag; /* -1 => alignment cartridge */ + long bt_csn; /* cartridge serial number */ + u_short bt_mbz; /* unused; should be 0 */ + u_short bt_flag; /* -1 => alignment cartridge */ struct bt_bad { - u_short bt_cyl; /* cylinder number of bad sector */ - u_short bt_trksec; /* track and sector number */ + u_short bt_cyl; /* bad sector cylinder number */ + u_short bt_trksec; /* track and sector number */ } bt_bad[126]; }; -.fi -.PP +.Ed +.Pp Unused slots in the -.I bt_bad +.Ar bt_bad array are filled with all bits set, a putatively illegal value. -.PP -.I Bad144 +.Pp +.Nm Bad144 is invoked by giving a device name (e.g. hk0, hp1, etc.). With no optional arguments it reads the first sector of the last track of the corresponding disk and prints out the bad sector information. It issues a warning if the bad sectors are out of order. -.I Bad144 +.Nm Bad144 may also be invoked with a serial number for the pack and a list of bad sectors. It will write the supplied information into all copies of the bad-sector file, replacing any previous information. Note, however, that -.I bad144 +.Nm bad144 does not arrange for the specified sectors to be marked bad in this case. This procedure should only be used to restore known bad sector information which was destroyed. -.PP -With the -.B \-a -option, -the argument list consists of new bad sectors to be added to an existing -list. -The new sectors are sorted into the list, -which must have been in order. -Replacement sectors are moved to accommodate the additions; -the new replacement sectors are cleared. -The entire process is described as it happens in gory detail if -.B \-v -(verbose) is given. -The -.B \-c -option forces an attempt to copy the old sector to the replacement, -and may be useful when replacing an unreliable sector. -.PP -If the disk is an RP06, RM03, RM05, Fujitsu Eagle, -or SMD disk on a Massbus, the -.B \-f -option may be used to mark the new bad sectors as ``bad'' -by reformatting them as unusable sectors. -This option is required unless the sectors have already been marked bad, -or the system will not be notified that it should use the replacement sector. -This option may be used while running multiuser; it is no longer necessary -to perform format operations while running single-user. -.PP +.Pp It is no longer necessary to reboot to allow the kernel to reread the bad-sector table from the drive. -.SH SEE ALSO -badsect(8), -format(8V) -.SH BUGS -It should be possible to format disks on-line under UNIX. -.PP +.Sh SEE ALSO +.Xr badsect 8 , +.Xr format 8 +.Sh BUGS +It should be possible to format disks on-line under +.Tn UNIX . +.Pp It should be possible to mark bad sectors on drives of all type. -.PP +.Pp On an 11/750, the standard bootstrap drivers used to boot the system do not understand bad sectors, -handle ECC errors, or the special SSE (skip sector) errors of RM80-type disks. +handle +.Tn ECC +errors, or the special +.Tn SSE +(skip sector) errors of RM80-type disks. This means that none of these errors can occur when reading the file -/vmunix to boot. Sectors 0-15 of the disk drive +.Pa /vmunix +to boot. Sectors 0-15 of the disk drive must also not have any of these errors. -.PP +.Pp The drivers which write a system core image on disk after a crash do not handle errors; thus the crash dump area must be free of errors and bad sectors. +.Sh HISTORY +The +.Nm +command appeared in +.Bx 4.1 . diff --git a/usr/src/usr.sbin/chown/chown.8 b/usr/src/usr.sbin/chown/chown.8 index f9599749cd..bfab35c25e 100644 --- a/usr/src/usr.sbin/chown/chown.8 +++ b/usr/src/usr.sbin/chown/chown.8 @@ -1,66 +1,75 @@ -.\" Copyright (c) 1990 The Regents of the University of California. +.\" Copyright (c) 1990, 1991 The Regents of the University of California. .\" All rights reserved. .\" .\" %sccs.include.redist.man% .\" -.\" @(#)chown.8 6.4 (Berkeley) %G% +.\" @(#)chown.8 6.5 (Berkeley) %G% .\" -.TH CHOWN 8 "" -.UC 4 -.SH NAME -chown \- change file owner and group -.SH SYNOPSIS -.nf -.ft B -chown [-Rf] [owner][:group] file ... -.SH DESCRIPTION -.I Chown +.Dd +.Dt CHOWN 8 +.Os BSD 4 +.Sh NAME +.Nm chown +.Nd change file owner and group +.Sh SYNOPSIS +.Nm chown +.Op Fl Rf +.Op Ar owner +.Op Ar group +.Ar file ... +.Sh DESCRIPTION +.Nm Chown sets the user ID and/or the group ID of the specified files. -.PP +.Pp The options are as follows: -.TP --R +.Bl -tag -width Ds +.It Fl R Change the user ID and/or the group ID for the file hierarchies rooted in the files instead of just the files themselves. -.TP --f +.It Fl f Don't report any failure to change file owner or group, nor modify the exit status to reflect such failures. -.PP +.El +.Pp The -.I owner +.Ar owner and -.I group +.Ar group operands are both optional, but at least one must be specified; if the group operand is specified, it must be preceded by a colon (``:'') character. -.PP +.Pp The -.I owner -should be either a numeric user ID or a user name. +.Ar owner +may be either a numeric user ID or a user name. If a user name is also a numeric user ID, the operand is used as a user name. The -.I group -should be either a numeric group ID or a group name. +.Ar group +may be either a numeric group ID or a group name. If a group name is also a numeric group ID, the operand is used as a group name. -.PP -Only the super-user may change the owner of a file in order to -simplify accounting procedures and to prevent the circumvention -of system security. -.PP +.Pp +The ownership of a file may only be altered by a super-user for +obvious security reasons. +.Pp The owner and group of symbolic links are themselves changed instead of the file to which the link points. -.PP +.Pp The -.I chown +.Nm chown utility exits 0 on success, and >0 if an error occurs. -.SH COMPATIBILITY +.Sh COMPATIBILITY Previous versions of the -.I chown +.Nm chown utility used the dot (``.'') character to distinguish the group name. This has been changed to be a colon (``:'') character so that user and group names may contain the dot character. -.SH "SEE ALSO" -chgrp(1), find(1), chown(2) +.Sh SEE ALSO +.Xr chgrp 1 , +.Xr find 1 , +.Xr chown 2 +.Sh STANDARDS +The +.Nm chown +command is expected to be POSIX 1003.2 compliant. diff --git a/usr/src/usr.sbin/chroot/chroot.8 b/usr/src/usr.sbin/chroot/chroot.8 index e49b863c29..9912d44e67 100644 --- a/usr/src/usr.sbin/chroot/chroot.8 +++ b/usr/src/usr.sbin/chroot/chroot.8 @@ -1,34 +1,54 @@ -.\" Copyright (c) 1988 The Regents of the University of California. +.\" Copyright (c) 1988, 1991 The Regents of the University of California. .\" All rights reserved. .\" .\" %sccs.include.redist.man% .\" -.\" @(#)chroot.8 5.2 (Berkeley) %G% +.\" @(#)chroot.8 5.3 (Berkeley) %G% .\" -.TH CHROOT 8 "" -.UC 6 -.SH NAME -chroot \- change root directory -.SH SYNOPSIS -.B chroot newroot [ command ] -.SH DESCRIPTION +.Dd +.Dt CHROOT 8 +.Os BSD 4.3 +.Sh NAME +.Nm chroot +.Nd change root directory +.Sh SYNOPSIS +.Nm chroot +.Ar newroot +.Op Ar command +.Sh DESCRIPTION The -.I chroot +.Nm chroot command changes its root directory to the supplied directory -.I newroot +.Ar newroot and exec's -.IR command , -if supplied, or an interactive copy of your shell (as specified -by the environmental variable -.IR SHELL ) -if not. -.I /bin/sh -is used if -.I SHELL -is not specified. -.PP +.Ar command , +if supplied, or an interactive copy of your shell. +.Pp Note, -.I command +.Ar command or the shell are run as your real-user-id. -.SH "SEE ALSO" -chdir(2), chroot(2), environ(7) +.Sh ENVIRONMENT +The following environment variable is referenced by +.Nm chroot : +.Bl -tag -width SHELL +.It Ev SHELL +If set, +the string specified by +.Ev SHELL +is interpreted as the name of +the shell to exec. +If the variable +.Ev SHELL +is not set, +.Pa /bin/sh +is used. +.El +.Sh SEE ALSO +.Xr chdir 2 , +.Xr chroot 2 , +.Xr environ 7 +.Sh HISTORY +The +.Nm +command +.Ud diff --git a/usr/src/usr.sbin/config/config.8 b/usr/src/usr.sbin/config/config.8 index e82715a623..d3131ed5e5 100644 --- a/usr/src/usr.sbin/config/config.8 +++ b/usr/src/usr.sbin/config/config.8 @@ -1,96 +1,134 @@ -.\" Copyright (c) 1980 The Regents of the University of California. +.\" Copyright (c) 1980, 1991 The Regents of the University of California. .\" All rights reserved. .\" .\" %sccs.include.redist.man% .\" -.\" @(#)config.8 6.4 (Berkeley) %G% +.\" @(#)config.8 6.5 (Berkeley) %G% .\" -.TH CONFIG 8 "" -.UC 4 -.SH NAME -config \- build system configuration files -.SH SYNOPSIS -.B config -[ -.B \-p -] -.I SYSTEM_NAME -.SH DESCRIPTION -.PP -.I Config -builds a set of system configuration files from a short file which describes -the sort of system that is being configured. It also takes as input a file -which tells -.I config -what files are needed to generate a system. -This can be augmented by a configuration specific set of files +.Dd +.Dt CONFIG 8 +.Os BSD 4 +.Sh NAME +.Nm config +.Nd build system configuration files +.Sh SYNOPSIS +.Nm config +.Op Fl p +.Ar SYSTEM_NAME +.Sh DESCRIPTION +.Pp +.Nm Config +builds a set of system configuration files from the file +.Ar SYSTEM_NAME +which describes +the system to configure. +A second file +tells +.Nm config +what files are needed to generate a system and +can be augmented by configuration specific set of files that give alternate files for a specific machine. -(see the FILES section below) +(see the +.Sx FILES +section below) +.Pp +Available option and operand: +.Pp +.Bl -tag -width SYSTEM_NAME +.It Fl p If the -.B \-p +.Fl p option is supplied, -.I config -will configure a system for profiling; c.f. -.IR kgmon (8) +.Nm config +will configure a system for profiling; for example, +.Xr kgmon 8 and -.IR gprof (1). -.PP -.I Config -should be run from the -.B conf -subdirectory of the system source (usually /sys/conf). -Its argument is the name of a system configuration file +.Xr gprof 1 . +.It Ar SYSTEM_NAME +specifies the name of the system configuration file containing device specifications, configuration options and other system parameters for one system configuration. -.I Config -assumes that there is already a directory -.I "../SYSTEM_NAME" -created and it places all its output files in there. +.El +.Pp +.Nm Config +should be run from the +.Pa conf +subdirectory of the system source (usually +.Pa /sys/conf ) . +.Nm Config +assumes the directory +.Pa ../SYSTEM_NAME +exists and places all output files there. The output of -.I config -consists of a number of files; for the VAX, they are: -.B ioconf.c -contains a description -of what I/O devices are attached to the system,; -.B ubglue.s -contains a set of interrupt service routines for devices -attached to the UNIBUS; -.B ubvec.s -contains offsets into a structure used for counting per-device interrupts; -.B Makefile -is a file used by -.IR make (1) -in building the system; a set of header files contain definitions of +.Nm config +consists of a number of files; for the +.Tn VAX , +they are: +.Pa ioconf.c , +a description +of what I/O devices are attached to the system; +.Pa ubglue.s , +a set of interrupt service routines for devices +attached to the +.Tn UNIBUS ; +.Pa ubvec.s , +offsets into a structure used for counting per-device interrupts; +.Pa Makefile , +used by +.Xr make 1 +in building the system; +header files, +definitions of the number of various devices that will be compiled into the system; -and a set of swap configuration files contain definitions for +swap configuration files, +definitions for the disk areas to be used for swapping, the root file system, argument processing, and system dumps. -.PP +.Pp After running -.IR config , -it is necessary to run ``make depend'' in the directory where the new makefile +.Nm config , +it is necessary to run +.Dq Li make depend +in the directory where the new makefile was created. -.I Config +.Nm Config prints a reminder of this when it completes. -.PP +.Pp If any other error messages are produced by -.I config, +.Nm config , the problems in the configuration file should be corrected and -.I config +.Nm config should be run again. Attempts to compile a system that had configuration errors -are likely to meet with failure. -.SH FILES -.nf -/sys/conf/Makefile.vax generic makefile for the VAX -/sys/conf/files list of common files system is built from -/sys/conf/files.vax list of VAX specific files -/sys/conf/devices.vax name to major device mapping file for the VAX -/sys/conf/files.ERNIE list of files specific to ERNIE system -.fi -.SH SEE ALSO -``Building 4.3BSD UNIX System with Config'' -.br +are likely to fail. +.Sh FILES +.Bl -tag -width /sys/conf/Makefile.vax -compact +.It Pa /sys/conf/Makefile.vax +generic makefile for the +.Tn VAX +.It Pa /sys/conf/files +list of common files system is built from +.It Pa /sys/conf/files.vax +list of +.Tn VAX +specific files +.It Pa /sys/conf/devices.vax +name to major device mapping file for the +.Tn VAX +.It Pa /sys/conf/files. Ns Em ERNIE +list of files specific to +.Em ERNIE +system +.El +.Sh SEE ALSO The SYNOPSIS portion of each device in section 4. -.SH BUGS +.Rs +.%T "Building 4.3 BSD UNIX System with Config" +.Re +.Sh BUGS The line numbers reported in error messages are usually off by one. +.Sh HISTORY +The +.Nm +command appeared in +.Bx 4.1 . diff --git a/usr/src/usr.sbin/diskpart/diskpart.8 b/usr/src/usr.sbin/diskpart/diskpart.8 index bc79f637bb..6df8ab87fa 100644 --- a/usr/src/usr.sbin/diskpart/diskpart.8 +++ b/usr/src/usr.sbin/diskpart/diskpart.8 @@ -1,39 +1,49 @@ -.\" Copyright (c) 1983 Regents of the University of California. -.\" All rights reserved. The Berkeley software License Agreement -.\" specifies the terms and conditions for redistribution. +.\" Copyright (c) 1983, 1991 Regents of the University of California. +.\" All rights reserved. .\" -.\" @(#)diskpart.8 6.5 (Berkeley) %G% +.\" %sccs.include.redist.man% .\" -.TH DISKPART 8 "" -.UC 4 -.SH NAME -diskpart \- calculate default disk partition sizes -.SH SYNOPSIS -.B diskpart -[ -.B \-p -] [ -.B \-d -] [ -.B \-s -size -] -disk-type -.SH DESCRIPTION -.I Diskpart +.\" @(#)diskpart.8 6.6 (Berkeley) %G% +.\" +.Dd +.Dt DISKPART 8 +.Os BSD 4 +.Sh NAME +.Nm diskpart +.Nd calculate default disk partition sizes +.Sh SYNOPSIS +.Nm diskpart +.Op Fl p +.Op Fl d +.Op Fl s Ar size +.Ar disk-type +.Sh DESCRIPTION +.Nm Diskpart is used to calculate the disk partition sizes based on the -default rules used at Berkeley. If the -.B \-p -option is supplied, tables suitable for inclusion in a device driver -are produced. If the -.B \-d -option is supplied, an entry suitable for inclusion in the disk +default rules used at Berkeley. +.Pp +Available options and operands: +.Bl -tag -width Fl +.It Fl p +Tables suitable for inclusion in a device driver +are produced. +.It Fl d +An entry suitable for inclusion in the disk description file -.I /etc/disktab -is generated; c.f. -.IR disktab (5). +.Pa /etc/disktab +is generated; for example, +.Xr disktab 5 . +.It Fl s Ar size +The size of the disk may be limited to +.Ar size +with the +.Fl s +option. +.El +.Pp On disks that use -.IR bad144 \|-style +.Xr bad144 8 +type of bad-sector forwarding, space is normally left in the last partition on the disk for a bad sector forwarding table, although this space @@ -41,51 +51,67 @@ is not reflected in the tables produced. The space reserved is one track for the replicated copies of the table and sufficient tracks to hold a pool of 126 sectors to which bad sectors are mapped. For more information, see -.IR bad144 (8). -The size of the disk may be limited with the -.B \-s -option, specifying the amount of the disk to be used. -This option is intended for other controllers that reserve some space at the end +.Xr bad144 8 . +The +.Fl s +option is intended for other controllers which reserve some space at the end of the disk for bad-sector replacements or other control areas, even if not a multiple of cylinders. -.PP +.Pp The disk partition sizes are based on the total amount of space on the disk as given in the table below (all values -are supplied in units of sectors). The `c' partition +are supplied in units of sectors). The +.Ql c +partition is, by convention, used to access the entire physical disk. The device driver tables include -the space reserved for the bad sector forwarding table in the `c' partition; +the space reserved for the bad sector forwarding table in the +.Ql c +partition; those used in the disktab and default formats exclude reserved tracks. -In normal operation, either the `g' partition is used, or the -`d', `e', and `f' partitions are used. The `g' and `f' partitions +In normal operation, either the +.Ql g +partition is used, or the +.Ql d , +.Ql e , +and +.Ql f +partitions are used. The +.Ql g +and +.Ql f +partitions are variable-sized, occupying whatever space remains after allocation of the fixed sized partitions. If the disk is smaller than 20 Megabytes, then -.I diskpart -aborts with the message ``disk too small, calculate by hand''. -.in +0.5i -.nf - -.ta \w'Partition 'u +\w'20-60 MB 'u +\w'61-205 MB 'u +\w'206-355 MB 'u +\w'356+ MB'u +.Nm diskpart +aborts with the message +.Dq Li disk too small, calculate by hand . +.Bl -column Partition 20-60\ MB 61-205\ MB 206-355\ MB 356+\ MB Partition 20-60 MB 61-205 MB 206-355 MB 356+ MB a 15884 15884 15884 15884 b 10032 33440 33440 66880 d 15884 15884 15884 15884 e unused 55936 55936 307200 h unused unused 291346 291346 - -.fi -.in -0.5i -.PP +.El +.Pp If an unknown disk type is specified, -.I diskpart +.Nm diskpart will prompt for the required disk geometry information. -.SH SEE ALSO -disktab(5), -bad144(8) -.SH BUGS +.Sh SEE ALSO +.Xr disktab 5 , +.Xr bad144 8 +.Sh BUGS Most default partition sizes are based on historical artifacts -(e.g. RP06), and may result in unsatisfactory layouts. -.PP -When using the \-d flag, alternate disk names are not included +(like the RP06), and may result in unsatisfactory layouts. +.Pp +When using the +.Fl d +flag, alternate disk names are not included in the output. +.Sh HISTORY +The +.Nm +command appeared in +.Bx 4.2 . diff --git a/usr/src/usr.sbin/inetd/inetd.8 b/usr/src/usr.sbin/inetd/inetd.8 index 4845ad4384..baa9a8ac23 100644 --- a/usr/src/usr.sbin/inetd/inetd.8 +++ b/usr/src/usr.sbin/inetd/inetd.8 @@ -1,23 +1,27 @@ -.\" Copyright (c) 1985 The Regents of the University of California. +.\" Copyright (c) 1985, 1991 The Regents of the University of California. .\" All rights reserved. .\" .\" %sccs.include.redist.man% .\" -.\" @(#)inetd.8 6.6 (Berkeley) %G% +.\" @(#)inetd.8 6.7 (Berkeley) %G% .\" -.TH INETD 8 "" -.UC 6 -.SH NAME -inetd \- internet ``super\-server'' -.SH SYNOPSIS -.B inetd -[ -.B \-d -] [ configuration file ] -.SH DESCRIPTION -.I Inetd +.Dd +.Dt INETD 8 +.Os BSD 4.3 +.Sh NAME +.Nm inetd +.Nd internet +.Dq super-server +.Sh SYNOPSIS +.Nm inetd +.Op Fl d +.Op Ar configuration file +.Sh DESCRIPTION +.Nm Inetd should be run at boot time by -.IR /etc/rc.local . +.Pa /etc/rc.local +(see +.Xr rc 8 ) . It then listens for connections on certain internet sockets. When a connection is found on one of its sockets, it decides what service the socket @@ -25,113 +29,168 @@ corresponds to, and invokes a program to service the request. After the program is finished, it continues to listen on the socket (except in some cases which will be described below). Essentially, -.I inetd +.Nm inetd allows running one daemon to invoke several others, reducing load on the system. -.PP +.Pp +The option available for +.Nm inetd: +.Bl -tag -width Ds +.It Fl d +Turns on debugging. +.El +.Pp Upon execution, -.I inetd +.Nm inetd reads its configuration information from a configuration file which, by default, is -.IR /etc/inetd.conf . +.Pa /etc/inetd.conf . There must be an entry for each field of the configuration file, with entries for each field separated by a tab or a space. Comments are denoted by a ``#'' at the beginning of a line. There must be an entry for each field. The fields of the configuration file are as follows: -.br - service name -.br - socket type -.br - protocol -.br - wait/nowait -.br - user -.br - server program -.br - server program arguments -.PP +.Pp +.Bd -unfilled -offset indent -compact +service name +socket type +protocol +wait/nowait +user +server program +server program arguments +.Ed +.Pp The -.I service name +.Em service-name entry is the name of a valid service in the file -.IR /etc/services/ . -For ``internal'' services (discussed below), the service +.Pa /etc/services . +For +.Dq internal +services (discussed below), the service name -.I must +.Em must be the official name of the service (that is, the first entry in -.IR /etc/services ). -.PP +.Pa /etc/services ) . +.Pp The -.I socket type -should be one of ``stream'', ``dgram'', ``raw'', ``rdm'', or ``seqpacket'', +.Em socket-type +should be one of +.Dq stream , +.Dq dgram , +.Dq raw , +.Dq rdm , +or +.Dq seqpacket , depending on whether the socket is a stream, datagram, raw, reliably delivered message, or sequenced packet socket. -.PP +.Pp The -.I protocol +.Em protocol must be a valid protocol as given in -.IR /etc/protocols . -Examples might be ``tcp'' or ``udp''. -.PP +.Pa /etc/protocols . +Examples might be +.Dq tcp +or +.Dq udp . +.Pp The -.I wait/nowait +.Em wait/nowait entry is applicable to datagram sockets only (other sockets should -have a ``nowait'' entry in this space). If a datagram server connects +have a +.Dq nowait +entry in this space). If a datagram server connects to its peer, freeing the socket so -.I inetd +.Nm inetd can received further messages on the socket, it is said to be -a ``multi-threaded'' server, and should use the ``nowait'' +a +.Dq multi-threaded +server, and should use the +.Dq nowait entry. For datagram servers which process all incoming datagrams on a socket and eventually time out, the server is said to be -``single-threaded'' and should use a ``wait'' entry. ``Comsat'' (``biff'') -and ``talk'' are both examples of the latter type of +.Dq single-threaded +and should use a +.Dq wait +entry. +.Xr Comsat 8 +.Pq Xr biff 1 +and +.Xr talkd 8 +are both examples of the latter type of datagram server. -.I Tftpd +.Xr Tftpd 8 is an exception; it is a datagram server that establishes pseudo-connections. -It must be listed as ``wait'' in order to avoid a race; +It must be listed as +.Dq wait +in order to avoid a race; the server reads the first packet, creates a new socket, and then forks and exits to allow -.I inetd +.Nm inetd to check for new service requests to spawn new servers. -.PP +.Pp The -.I user +.Em user entry should contain the user name of the user as whom the server should run. This allows for servers to be given less permission than root. +.Pp The -.I server program +.Em server-program entry should contain the pathname of the program which is to be executed by -.I inetd +.Nm inetd when a request is found on its socket. If -.I inetd +.Nm inetd provides this service internally, this entry should -be ``internal''. -.PP -The arguments to the server program should be just as they +be +.Dq internal . +.Pp +The +.Em server program arguments +should be just as arguments normally are, starting with argv[0], which is the name of the program. If the service is provided internally, the -word ``internal'' should take the place of this entry. -.PP -.I Inetd -provides several ``trivial'' services internally by use of -routines within itself. These services are ``echo'', -``discard'', ``chargen'' (character generator), ``daytime'' -(human readable time), and ``time'' (machine readable time, +word +.Dq internal +should take the place of this entry. +.Pp +.Nm Inetd +provides several +.Dq trivial +services internally by use of +routines within itself. These services are +.Dq echo , +.Dq discard , +.Dq chargen +(character generator), +.Dq daytime +(human readable time), and +.Dq time +(machine readable time, in the form of the number of seconds since midnight, January 1, 1900). All of these services are tcp based. For -details of these services, consult the appropriate RFC +details of these services, consult the appropriate +.Tn RFC from the Network Information Center. -.PP -.I Inetd -rereads its configuration file when it receives a hangup signal, SIGHUP. +.Pp +.Nm Inetd +rereads its configuration file when it receives a hangup signal, +.Dv SIGHUP . Services may be added, deleted or modified when the configuration file is reread. -.SH "SEE ALSO" -comsat(8), fingerd(8), ftpd(8), rexecd(8), rlogind(8), rshd(8), -telnetd(8), tftpd(8) +.Sh SEE ALSO +.Xr comsat 8 , +.Xr fingerd 8 , +.Xr ftpd 8 , +.Xr rexecd 8 , +.Xr rlogind 8 , +.Xr rshd 8 , +.Xr telnetd 8 , +.Xr tftpd 8 +.Sh HISTORY +The +.Nm +command appeared in +.Bx 4.3 . diff --git a/usr/src/usr.sbin/kgmon/kgmon.8 b/usr/src/usr.sbin/kgmon/kgmon.8 index f94b9e1bfa..175f7d6601 100644 --- a/usr/src/usr.sbin/kgmon/kgmon.8 +++ b/usr/src/usr.sbin/kgmon/kgmon.8 @@ -1,86 +1,93 @@ -.\" Copyright (c) 1983 The Regents of the University of California. +.\" Copyright (c) 1983, 1991 The Regents of the University of California. .\" All rights reserved. .\" .\" %sccs.include.redist.man% .\" -.\" @(#)kgmon.8 6.3 (Berkeley) %G% +.\" @(#)kgmon.8 6.4 (Berkeley) %G% .\" -.TH KGMON 8 "" -.UC 5 -.SH NAME -kgmon \- generate a dump of the operating system's profile buffers -.SH SYNOPSIS -.B kgmon -[ -.B \-b -] [ -.B \-h -] [ -.B \-r -] [ -.B \-p -] [ system ] [ memory ] -.SH DESCRIPTION -.I Kgmon +.Dd +.Dt KGMON 8 +.Os BSD 4.2 +.Sh NAME +.Nm kgmon +.Nd generate a dump of the operating system's profile buffers +.Sh SYNOPSIS +.Nm kgmon +.Op Fl b +.Op Fl h +.Op Fl r +.Op Fl p +.Op Ar system +.Op Ar memory +.Sh DESCRIPTION +.Nm Kgmon is a tool used when profiling the operating system. When no arguments are supplied, -.I kgmon +.Nm kgmon indicates the state of operating system profiling as running, off, or not configured. (see -.IR config (8)) +.Xr config 8 ) If the -.B \-p +.Fl p flag is specified, -.I kgmon +.Nm kgmon extracts profile data from the operating system and produces a -.I gmon.out +.Pa gmon.out file suitable for later analysis by -.IR gprof (1). -.PP +.Xr gprof 1 . +.Pp The following options may be specified: -.TP -.B \-b +.Bl -tag -width Ds +.It Fl b Resume the collection of profile data. -.TP -.B \-h +.It Fl h Stop the collection of profile data. -.TP -.B \-p +.It Fl p Dump the contents of the profile buffers into a -.I gmon.out +.Pa gmon.out file. -.TP -.B \-r +.It Fl r Reset all the profile buffers. If the -.B \-p +.Fl p flag is also specified, the -.I gmon.out +.Pa gmon.out file is generated before the buffers are reset. -.PP +.El +.Pp If neither -.B \-b +.Fl b nor -.B \-h +.Fl h is specified, the state of profiling collection remains unchanged. For example, if the -.B \-p +.Fl p flag is specified and profile data is being collected, profiling will be momentarily suspended, the operating system profile buffers will be dumped, and profiling will be immediately resumed. -.SH FILES -/vmunix \- the default system -.br -/dev/kmem \- the default memory -.SH "SEE ALSO" -gprof(1), -config(8) -.SH DIAGNOSTICS -Users with only read permission on /dev/kmem cannot change the state +.Sh FILES +.Bl -tag -width /dev/kmemx -compact +.It Pa /vmunix +the default system +.It Pa /dev/kmem +the default memory +.El +.Sh SEE ALSO +.Xr gprof 1 , +.Xr config 8 +.Sh DIAGNOSTICS +Users with only read permission on +.Pa /dev/kmem +cannot change the state of profiling collection. They can get a -.I gmon.out +.Pa gmon.out file with the warning that the data may be inconsistent if profiling is in progress. +.Sh HISTORY +The +.Nm +command appeared in +.Bx 4.2 . diff --git a/usr/src/usr.sbin/kvm_mkdb/kvm_mkdb.8 b/usr/src/usr.sbin/kvm_mkdb/kvm_mkdb.8 index 99b4bcf747..11ba426b03 100644 --- a/usr/src/usr.sbin/kvm_mkdb/kvm_mkdb.8 +++ b/usr/src/usr.sbin/kvm_mkdb/kvm_mkdb.8 @@ -1,37 +1,40 @@ -.\" Copyright (c) 1989 The Regents of the University of California. +.\" Copyright (c) 1989, 1991 The Regents of the University of California. .\" All rights reserved. .\" .\" %sccs.include.redist.man% .\" -.\" @(#)kvm_mkdb.8 5.1 (Berkeley) %G% +.\" @(#)kvm_mkdb.8 5.2 (Berkeley) %G% .\" -.TH kvm_mkdb 8 "" -.UC 7 -.SH NAME -kvm_mkdb \- create kernel database -.SH SYNOPSIS -.B kvm_mkdb [ file ] -.SH DESCRIPTION -.I Kvm_mkdb -creates a -.IR db(3) -database in ``/var/run/kvm_vmunix.db'' which contains the -namelist of -.I file -(or, by default, /vmunix). -Each symbol is stored with its name as the key and its associated -nlist structure as the data. -.PP -The -.IR kvm_nlist (3) -library routines use this database. -.PP -The text string found at the location referenced by the symbol -``_version'' is stored as the data associated with the special -key ``VERSION''. -.SH FILES -/vmunix Default file read for namelist -.br -/var/run/kvm_vmunix.db Database file -.SH SEE ALSO -db(3), kvm_nlist(3), nlist(3), dev_mkdb(8) +.Dd +.Dt KVM_MKDB 8 +.Os +.Sh NAME +.Nm kvm_mkdb +.Nd create kernel database +.Sh SYNOPSIS +.Nm kvm_mkdb +.Sh DESCRIPTION +.Nm Kvm_mkdb +creates a database in +.Pa /var/run +containing information about +.Pa /vmunix +and +perhaps other fairly static information about the current system. +Various library routines consult this database. +The only information currently stored is the kernel namelist, which is +used by the +.Xr kvm_nlist 3 +function. +.Sh FILES +.Bl -tag -width /var/run/kvm_vmunix.{dir,pag} -compact +.It Pa /vmunix +.It Pa /var/run/kvm_vmunix.{dir,pag} +.El +.Sh SEE ALSO +.Xr kvm_nlist 3 +.Sh HISTORY +The +.Nm +command +.Ud diff --git a/usr/src/usr.sbin/lpr/lpc/lpc.8 b/usr/src/usr.sbin/lpr/lpc/lpc.8 index 2bc61f9e18..a8fe9a2789 100644 --- a/usr/src/usr.sbin/lpr/lpc/lpc.8 +++ b/usr/src/usr.sbin/lpr/lpc/lpc.8 @@ -1,144 +1,148 @@ -.\" Copyright (c) 1983 The Regents of the University of California. +.\" Copyright (c) 1983, 1991 The Regents of the University of California. .\" All rights reserved. .\" .\" %sccs.include.redist.man% .\" -.\" @(#)lpc.8 6.3 (Berkeley) %G% +.\" @(#)lpc.8 6.4 (Berkeley) %G% .\" -.TH LPC 8 "" -.UC 5 -.ad -.SH NAME -lpc \- line printer control program -.SH SYNOPSIS -.B lpc -[ command [ argument ... ] ] -.SH DESCRIPTION -.I Lpc +.Dd +.Dt LPC 8 +.Os BSD 4.2 +.Sh NAME +.Nm lpc +.Nd line printer control program +.Sh SYNOPSIS +.Nm lpc +.Oo +.Ar command +.Op Ar argument ... +.Oc +.Sh DESCRIPTION +.Nm Lpc is used by the system administrator to control the operation of the line printer system. -For each line printer configured in /etc/printcap, -.I lpc +For each line printer configured in +.Pa /etc/printcap , +.Nm lpc may be used to: -.IP \(bu +.Bl -bullet -offset indent +.It disable or enable a printer, -.IP \(bu +.It disable or enable a printer's spooling queue, -.IP \(bu +.It rearrange the order of jobs in a spooling queue, -.IP \(bu +.It find the status of printers, and their associated spooling queues and printer dameons. -.PP +.El +.Pp Without any arguments, -.I lpc +.Nm lpc will prompt for commands from the standard input. If arguments are supplied, -.IR lpc +.Nm lpc interprets the first argument as a command and the remaining arguments as parameters to the command. The standard input may be redirected causing -.I lpc +.Nm lpc to read commands from file. Commands may be abreviated; the following is the list of recognized commands. -.TP -? [ command ... ] -.TP -help [ command ... ] -.br +.Pp +.Bl -tag -width Ds -compact +.It Ic \&? No [ command ... ] +.It Ic help No [ command ... ] Print a short description of each command specified in the argument list, or, if no arguments are given, a list of the recognized commands. -.TP -abort { all | printer ... } -.br +.Pp +.It Ic abort No {\ all\ |\ printer\ } Terminate an active spooling daemon on the local host immediately and then disable printing (preventing new daemons from being started by -.IR lpr ) +.Xr lpr ) for the specified printers. -.TP -clean { all | printer ... } -.br +.Pp +.It Ic clean No {\ all\ |\ printer\ } Remove any temporary files, data files, and control files that cannot be printed (i.e., do not form a complete printer job) from the specified printer queue(s) on the local machine. -.TP -disable { all | printer ... } -.br +.Pp +.It Ic disable No {\ all\ |\ printer\ } Turn the specified printer queues off. This prevents new printer jobs from being entered into the queue by -.IR lpr . -.TP -down { all | printer } message ... -.br +.Xr lpr . +.Pp +.It Ic down No {\ all\ |\ printer\ } message ... Turn the specified printer queue off, disable printing and put -.I message +.Em message in the printer status file. The message doesn't need to be quoted, the remaining arguments are treated like -.IR echo (1). +.Xr echo 1 . This is normally used to take a printer down and let others know why -(lpq will indicate the printer is down and print the status message). -.TP -enable { all | printer ... } -.br +.Xr lpq 1 +will indicate the printer is down and print the status message). +.Pp +.It Ic enable No {\ all\ |\ printer\ } Enable spooling on the local queue for the listed printers. This will allow -.I lpr +.Xr lpr 1 to put new jobs in the spool queue. -.TP -exit -.TP -quit -.br +.Pp +.It Ic exit +.It Ic quit Exit from lpc. -.TP -restart { all | printer ... } -.br +.Pp +.It Ic restart No {\ all\ |\ printer\ } Attempt to start a new printer daemon. This is useful when some abnormal condition causes the daemon to die unexpectedly leaving jobs in the queue. -.I Lpq +.Xr Lpq will report that there is no daemon present when this condition occurs. If the user is the super-user, try to abort the current daemon first (i.e., kill and restart a stuck daemon). -.TP -start { all | printer ... } -.br +.Pp +.It Ic start No {\ all\ |\ printer\ } Enable printing and start a spooling daemon for the listed printers. -.TP -status { all | printer ... } +.Pp +.It Ic status No {\ all\ |\ printer\ } Display the status of daemons and queues on the local machine. -.TP -stop { all | printer ... } -.br +.Pp +.It Ic stop No {\ all\ |\ printer\ } Stop a spooling daemon after the current job completes and disable printing. -.TP -topq printer [ jobnum ... ] [ user ... ] -.br +.Pp +.It Ic topq No printer\ [\ jobnum\ ...\ ]\ [\ user\ ...\ ] Place the jobs in the order listed at the top of the printer queue. -.TP -up { all | printer ... } -.br +.Pp +.It Ic up No {\ all\ |\ printer\ } Enable everything and start a new printer daemon. Undoes the effects of -.IR down . -.SH FILES -.nf -.ta \w'/etc/printcap 'u -/etc/printcap printer description file -/var/spool/* spool directories -/var/spool/*/lock lock file for queue control -.fi -.SH "SEE ALSO" -lpd(8), -lpr(1), -lpq(1), -lprm(1), -printcap(5) -.SH DIAGNOSTICS -.nf -.ta \w'?Ambiguous command 'u -?Ambiguous command abreviation matches more than one command -?Invalid command no match was found -?Privileged command command can be executed by root only -.fi +.Ic down . +.Sh FILES +.Bl -tag -width /var/spool/*/lockx -compact +.It Pa /etc/printcap +printer description file +.It Pa /var/spool/* +spool directories +.It Pa /var/spool/*/lock +lock file for queue control +.El +.Sh SEE ALSO +.Xr lpd 8 , +.Xr lpr 1 , +.Xr lpq 1 , +.Xr lprm 1 , +.Xr printcap 5 +.Sh DIAGNOSTICS +.Bl -tag -width Ds +.It Sy "?Ambiguous command" +abreviation matches more than one command +.It Sy "?Invalid command" +no match was found +.It Sy "?Privileged command" +command can be executed by root only +.El +.Sh HISTORY +The +.Nm +command appeared in +.Bx 4.2 . diff --git a/usr/src/usr.sbin/lpr/lpd/lpd.8 b/usr/src/usr.sbin/lpr/lpd/lpd.8 index 89cebb95d9..2bcc5a0bec 100644 --- a/usr/src/usr.sbin/lpr/lpd/lpd.8 +++ b/usr/src/usr.sbin/lpr/lpd/lpd.8 @@ -1,207 +1,223 @@ -.\" Copyright (c) 1983 The Regents of the University of California. +.\" Copyright (c) 1983, 1991 The Regents of the University of California. .\" All rights reserved. .\" .\" %sccs.include.redist.man% .\" -.\" @(#)lpd.8 6.5 (Berkeley) %G% +.\" @(#)lpd.8 6.6 (Berkeley) %G% .\" -.TH LPD 8 "" -.UC 5 -.ad -.SH NAME -lpd \- line printer daemon -.SH SYNOPSIS -.B lpd -[ -.B \-l -] [ port # ] -.SH DESCRIPTION -.I Lpd +.Dd +.Dt LPD 8 +.Os BSD 4.2 +.Sh NAME +.Nm lpd +.Nd line printer spooler daemon +.Sh SYNOPSIS +.Nm lpd +.Op Fl l +.Op Ar port# +.Sh DESCRIPTION +.Nm Lpd is the line printer daemon (spool area handler) and is normally invoked at boot time from the -.IR rc (8) +.Xr rc 8 file. It makes a single pass through the -.IR printcap (5) +.Xr printcap 5 file to find out about the existing printers and prints any files left after a crash. It then uses the system calls -.IR listen (2) +.Xr listen 2 and -.IR accept (2) +.Xr accept 2 to receive requests to print files in the queue, transfer files to the spooling area, display the queue, or remove jobs from the queue. In each case, it forks a child to handle the request so the parent can continue to listen for more requests. -The Internet port number used to rendezvous -with other processes is normally obtained with -.IR getservbyname (3) -but can be changed with the -.IR port # -argument. +.Pp +Available options: +.Bl -tag -width Ds +.It Fl l The -.B \-l +.Fl l flag causes -.I lpd +.Nm lpd to log valid requests received from the network. This can be useful for debugging purposes. -.PP -Access control is provided by two means. First, All requests must come from +.It Ar "port#" +The Internet port number used to rendezvous +with other processes is normally obtained with +.Xr getservbyname 3 +but can be changed with the +.Ar port# +argument. +.El +.Pp +Access control is provided by two means. First, all requests must come from one of the machines listed in the file -.I /etc/hosts.equiv +.Pa /etc/hosts.equiv or -.IR /etc/hosts.lpd . -Second, if the ``rs'' capability is specified in the -.I printcap +.Pa /etc/hosts.lpd . +Second, if the +.Li rs +capability is specified in the +.Xr printcap entry for the printer being accessed, -.I lpr +.Em lpr requests will only be honored for those users with accounts on the machine with the printer. -.PP +.Pp The file -.I minfree +.Em minfree in each spool directory contains the number of disk blocks to leave free so that the line printer queue won't completely fill the disk. The -.I minfree +.Em minfree file can be edited with your favorite text editor. -.PP -The file -.I lock -in each spool directory is used to prevent multiple daemons from -becoming active simultaneously, and to store information -about the daemon process for -.IR lpr (1), -.IR lpq (1), -and -.IR lprm (1). -After the daemon has successfully set the lock, it scans the directory +.Pp +The daemon begins processing files +after it has successfully set the lock for exclusive +access (descibed a bit later), +and scans the spool directory for files beginning with -.IR cf . +.Em cf . Lines in each -.I cf +.Em cf file specify files to be printed or non-printing actions to be performed. Each such line begins with a key character to specify what to do with the remainder of the line. -.in +3 -.IP J +.Bl -tag -width Ds +.It J Job Name. String to be used for the job name on the burst page. -.IP C +.It C Classification. String to be used for the classification line on the burst page. -.IP L +.It L Literal. The line contains identification info from the password file and causes the banner page to be printed. -.IP T +.It T Title. String to be used as the title for -.IR pr (1). -.IP H +.Xr pr 1 . +.It H Host Name. Name of the machine where -.I lpr +.Xr lpr was invoked. -.IP P +.It P Person. Login name of the person who invoked -.IR lpr . +.Xr lpr . This is used to verify ownership by -.IR lprm . -.IP M +.Xr lprm . +.It M Send mail to the specified user when the current print job completes. -.IP f +.It f Formatted File. Name of a file to print which is already formatted. -.IP l +.It l Like ``f'' but passes control characters and does not make page breaks. -.IP p +.It p Name of a file to print using -.IR pr (1) +.Xr pr 1 as a filter. -.IP t +.It t Troff File. The file contains -.IR troff (1) +.Xr troff 1 output (cat phototypesetter commands). -.IP n +.It n Ditroff File. The file contains device independent troff output. -.IP d +.It r DVI File. The file contains -.IR Tex (l) -output (DVI format from Standford). -.IP g +.Tn Tex l +output +DVI format from Standford). +.It g Graph File. The file contains data produced by -.IR plot (3X). -.IP c +.Xr plot 3 . +.It c Cifplot File. The file contains data produced by -.IR cifplot . -.IP v +.Em cifplot . +.It v The file contains a raster image. -.IP r -The file contains text data with FORTRAN carriage control characters. -.IP 1 +.It r +The file contains text data with +FORTRAN carriage control characters. +.It \&1 Troff Font R. Name of the font file to use instead of the default. -.IP 2 +.It \&2 Troff Font I. Name of the font file to use instead of the default. -.IP 3 +.It \&3 Troff Font B. Name of the font file to use instead of the default. -.IP 4 +.It \&4 Troff Font S. Name of the font file to use instead of the default. -.IP W +.It W Width. Changes the page width (in characters) used by -.IR pr (1) +.Xr pr 1 and the text filters. -.IP I +.It I Indent. The number of characters to indent the output by (in ascii). -.IP U +.It U Unlink. Name of file to remove upon completion of printing. -.IP N +.It N File name. The name of the file which is being printed, or a blank for the standard input (when -.I lpr +.Xr lpr is invoked in a pipeline). -.in -5 -.PP +.El +.Pp If a file can not be opened, a message will be logged via -.IR syslog (3) +.Xr syslog 3 using the -.I LOG_LPR +.Em LOG_LPR facility. -.I Lpd +.Nm Lpd will try up to 20 times to reopen a file it expects to be there, after which it will skip the file to be printed. -.PP -.I Lpd +.Pp +.Nm Lpd uses -.IR flock (2) +.Xr flock 2 to provide exclusive access to the lock file and to prevent multiple deamons from becoming active simultaneously. If the daemon should be killed or die unexpectedly, the lock file need not be removed. -The lock file is kept in a readable ASCII form +The lock file is kept in a readable +.Tn ASCII +form and contains two lines. The first is the process id of the daemon and the second is the control file name of the current job being printed. The second line is updated to reflect the current status of -.I lpd +.Nm lpd for the programs -.IR lpq (1) +.Xr lpq 1 and -.IR lprm (1). -.SH FILES -.nf -.ta \w'/etc/printcap 'u -/etc/printcap printer description file -/var/spool/* spool directories -/var/spool/*/minfree minimum free space to leave -/dev/lp* line printer devices -/dev/printer socket for local requests -/etc/hosts.equiv lists machine names allowed printer access -/etc/hosts.lpd lists machine names allowed printer access, - but not under same administrative control. -.fi -.SH "SEE ALSO" -lpc(8), -pac(1), -lpr(1), -lpq(1), -lprm(1), -syslog(3), -printcap(5) -.br -.ul -4.2BSD Line Printer Spooler Manual +.Xr lprm 1 . +.Sh FILES +.Bl -tag -width "/var/spool/*/minfree" -compact +.It Pa /etc/printcap +printer description file +.It Pa /var/spool/* +spool directories +.It Pa /var/spool/*/minfree +minimum free space to leave +.It Pa /dev/lp* +line printer devices +.It Pa /dev/printer +socket for local requests +.It Pa /etc/hosts.equiv +lists machine names allowed printer access +.It Pa /etc/hosts.lpd +lists machine names allowed printer access, +but not under same administrative control. +.El +.Sh SEE ALSO +.Xr lpc 8 , +.Xr pac 1 , +.Xr lpr 1 , +.Xr lpq 1 , +.Xr lprm 1 , +.Xr syslog 3 , +.Xr printcap 5 +.Rs +.%T "4.2 BSD Line Printer Spooler Manual" +.Re +.Sh HISTORY +An +.Nm +daemon appeared in Version 6 AT&T UNIX. diff --git a/usr/src/usr.sbin/lpr/pac/pac.8 b/usr/src/usr.sbin/lpr/pac/pac.8 index ccb6b4112c..98ec62f414 100644 --- a/usr/src/usr.sbin/lpr/pac/pac.8 +++ b/usr/src/usr.sbin/lpr/pac/pac.8 @@ -1,85 +1,80 @@ -.\" Copyright (c) 1983 The Regents of the University of California. +.\" Copyright (c) 1983, 1991 The Regents of the University of California. .\" All rights reserved. .\" .\" %sccs.include.redist.man% .\" -.\" @(#)pac.8 6.4 (Berkeley) %G% +.\" @(#)pac.8 6.5 (Berkeley) %G% .\" -.TH PAC 8 "" -.UC 5 -.SH NAME -pac \- printer/plotter accounting information -.SH SYNOPSIS -.B pac -[ -.B \-Pprinter -] [ -.B \-pprice -] [ -.B \-s -] [ -.B \-r -] [ -.B \-c -] [ -.B \-m -] [ name ... ] -.SH DESCRIPTION -.I Pac +.Dd +.Dt PAC 8 +.Os BSD 4.2 +.Sh NAME +.Nm pac +.Nd printer/plotter accounting information +.Sh SYNOPSIS +.Nm pac +.Op Fl P Ns Ar printer +.Op Fl c +.Op Fl m +.Op Fl p Ns Ar price +.Op Fl s +.Op Fl r +.Op Ar name ... +.Sh DESCRIPTION +.Nm Pac reads the printer/plotter accounting files, accumulating the number of pages (the usual case) or feet (for raster devices) of paper consumed by each user, and printing out how much each user consumed in pages or feet and dollars. -If any -.I names -are specified, then statistics are only printed for those users; -usually, statistics are printed for every user who has used any paper. -.PP -The -.B \-P -flag causes accounting to be done for the named printer. +.Pp +Options and operands available: +.Bl -tag -width PPprinter +.It Fl P Ns Ar printer +Accounting is done for the named printer. Normally, accounting is done for the default printer (site dependent) or the value of the environment variable -.B PRINTER +.Ev PRINTER is used. -.PP -The -.B \-p -flag causes the value -.I price -to be used for the cost in dollars instead of the default value of 0.02 -or the price specified in -.IR /etc/printcap. -.PP -The -.B \-c +.It Fl c flag causes the output to be sorted by cost; usually the output is sorted alphabetically by name. -.PP -The -.B \-r -flag reverses the sorting order. -.PP -The -.B \-s -flag causes the accounting information to be summarized on the -summary accounting file; this summarization is necessary since on a -busy system, the accounting file can grow by several lines per day. -.PP -The -.B \-m +.It Fl m flag causes the host name to be ignored in the accounting file. This allows for a user on multiple machines to have all of his printing charges grouped together. -.SH FILES -.ta 2i -/var/account/?acct raw accounting files -.br -/var/account/?_sum summary accounting files -.br -/etc/printcap printer capability data base -.SH SEE ALSO -printcap(5) -.SH BUGS +.It Fl p Ns Ar price +The value +.Ar price +is used for the cost in dollars instead of the default value of 0.02 +or the price specified in +.Pa /etc/printcap . +.It Fl r +Reverse the sorting order. +.It Fl s +Accounting information is summarized on the +summary accounting file; this summarization is necessary since on a +busy system, the accounting file can grow by several lines per day. +.It Ar names +Statistics are only printed for user(s) +.Ar name ; +usually, statistics are printed for every user who has used any paper. +.El +.Sh FILES +.Bl -tag -width /var/account/?_sum -compact +.It Pa /var/account/?acct +raw accounting files +.It Pa /var/account/?_sum +summary accounting files +.It Pa /etc/printcap +printer capability data base +.El +.Sh SEE ALSO +.Xr printcap 5 +.Sh BUGS The relationship between the computed price and reality is as yet unknown. +.Sh HISTORY +The +.Nm +command appeared in +.Bx 4.0 . diff --git a/usr/src/usr.sbin/mkproto/mkproto.8 b/usr/src/usr.sbin/mkproto/mkproto.8 index 23a9f7cd0e..bc4ea67995 100644 --- a/usr/src/usr.sbin/mkproto/mkproto.8 +++ b/usr/src/usr.sbin/mkproto/mkproto.8 @@ -1,25 +1,28 @@ -.\" Copyright (c) 1983 Regents of the University of California. -.\" All rights reserved. The Berkeley software License Agreement -.\" specifies the terms and conditions for redistribution. +.\" Copyright (c) 1983, 1991 Regents of the University of California. +.\" All rights reserved. .\" -.\" @(#)mkproto.8 6.2 (Berkeley) %G% +.\" %sccs.include.redist.man% .\" -.TH MKPROTO 8 "" -.UC 5 -.SH NAME -mkproto \- construct a prototype file system -.SH SYNOPSIS -.B mkproto -special proto -.SH DESCRIPTION -.I Mkproto +.\" @(#)mkproto.8 6.3 (Berkeley) %G% +.\" +.Dd +.Dt MKPROTO 8 +.Os BSD 4.2 +.Sh NAME +.Nm mkproto +.Nd construct a prototype file system +.Sh SYNOPSIS +.Nm mkproto +.Ar special proto +.Sh DESCRIPTION +.Nm Mkproto is used to bootstrap a new file system. First a new file system is created using -.IR newfs (8). -.I Mkproto +.Xr newfs 8 . +.Nm Mkproto is then used to copy files from the old file system into the new file system according to the directions found in the prototype file -.I proto. +.Ar proto . The prototype file contains tokens separated by spaces or new lines. @@ -32,50 +35,50 @@ the group id, and the initial contents of the file. The syntax of the contents field depends on the mode. -.PP +.Pp The mode token for a file is a 6 character string. The first character specifies the type of the file. (The characters -.B \-bcd +.Fl bcd specify regular, block special, character special and directory files respectively.) The second character of the type is either -.B u +.Cm u or -.B \- +.Ql Fl to specify set-user-id mode or not. The third is -.B g +.Cm g or -.B \- +.Ql Fl for the set-group-id mode. The rest of the mode is a three digit octal number giving the owner, group, and other read, write, execute permissions, see -.IR chmod (1). -.PP +.Xr chmod 1 . +.Pp Two decimal number tokens come after the mode; they specify the user and group ID's of the owner of the file. -.PP +.Pp If the file is a regular file, the next token is a pathname whence the contents and size are copied. -.PP +.Pp If the file is a block or character special file, two decimal number tokens follow which give the major and minor device numbers. -.PP +.Pp If the file is a directory, -.I mkproto +.Nm mkproto makes the entries -.BR . "" +.Ql \&. and -.B .. +.Ql \&.. and then reads a list of names and (recursively) @@ -83,12 +86,10 @@ file specifications for the entries in the directory. The scan is terminated with the token -.BR $ . -.PP +.Cm $ . +.Pp A sample prototype specification follows: -.PP -.nf -.in +5 +.Bd -literal -offset indent d\-\-777 3 1 usr d\-\-777 3 1 sh \-\-\-755 3 1 /bin/sh @@ -98,18 +99,22 @@ usr d\-\-777 3 1 c0 c\-\-644 3 1 0 0 $ $ -.in -5 -.fi -.dt -.SH "SEE ALSO" -fs(5), -dir(5), -fsck(8), -newfs(8) -.SH BUGS +.Ed +.Sh SEE ALSO +.Xr fs 5 , +.Xr dir 5 , +.Xr fsck 8 , +.Xr newfs 8 +.Sh BUGS There should be some way to specify links. -.PP +.Pp There should be some way to specify bad blocks. -.PP -Mkproto can only be run on virgin file systems. +.Pp +.Nm Mkproto +can only be run on virgin file systems. It should be possible to copy files into existent file systems. +.Sh HISTORY +The +.Nm +command appeared in +.Bx 4.2 . diff --git a/usr/src/usr.sbin/portmap/portmap.8 b/usr/src/usr.sbin/portmap/portmap.8 index 41366b8601..6535e0ccc5 100644 --- a/usr/src/usr.sbin/portmap/portmap.8 +++ b/usr/src/usr.sbin/portmap/portmap.8 @@ -1,74 +1,84 @@ .\" Copyright (c) 1987 Sun Microsystems -.\" Copyright (c) 1990 The Regents of the University of California. +.\" Copyright (c) 1990, 1991 The Regents of the University of California. .\" All rights reserved. .\" .\" %sccs.include.redist.man% .\" -.\" @(#)portmap.8 5.2 (Berkeley) %G% +.\" @(#)portmap.8 5.3 (Berkeley) %G% .\" -.TH PORTMAP 8 "" -.UC 6 -.SH NAME -portmap \- DARPA port to RPC program number mapper -.SH SYNOPSIS -.B portmap -[ -.B \-d -] -.SH DESCRIPTION -.IX "portmap command" "" "\fLportmap\fP \(em DARPA to RPC mapper" -.IX DARPA "to RPC mapper \(em \fLportmap\fP" -.B Portmap +.Dd +.Dt PORTMAP 8 +.Os BSD 4.3 +.Sh NAME +.Nm portmap +.Nd +.Tn DARPA +port to +.Tn RPC +program number mapper +.Sh SYNOPSIS +.Nm portmap +.Op Fl d +.Sh DESCRIPTION +.Nm Portmap is a server that converts -.SM RPC +.Tn RPC program numbers into -.SM DARPA +.Tn DARPA protocol port numbers. It must be running in order to make -.SM RPC +.Tn RPC calls. -.PP +.Pp When an -.SM RPC +.Tn RPC server is started, it will tell -.B portmap +.Nm portmap what port number it is listening to, and what -.SM RPC +.Tn RPC program numbers it is prepared to serve. When a client wishes to make an -.SM RPC +.Tn RPC call to a given program number, it will first contact -.B portmap +.Nm portmap on the server machine to determine the port number where -.SM RPC +.Tn RPC packets should be sent. -.PP -.B Portmap +.Pp +.Nm Portmap must be started before any -.SM RPC +.Tn RPC servers are invoked. -.PP +.Pp Normally -.B portmap +.Nm portmap forks and dissociates itself from the terminal like any other daemon. -.B Portmap +.Nm Portmap then logs errors using -.IR syslog (3). -The -.B \-d -(debug) option prevents -.B portmap +.Xr syslog 3 . +.Pp +Option available: +.Bl -tag -width Ds +.It Fl d +(debug) prevents +.Nm portmap from running as a daemon, and causes errors and debugging information to be printed to the standard error output. -.SH "SEE ALSO" -inetd.conf(5), -rpcinfo(8), -inetd(8) -.SH BUGS +.El +.Sh SEE ALSO +.Xr inetd.conf 5 , +.Xr rpcinfo 8 , +.Xr inetd 8 +.Sh BUGS If -.B portmap +.Nm portmap crashes, all servers must be restarted. +.Sh HISTORY +The +.Nm +command appeared in +.Bx 4.3 diff --git a/usr/src/usr.sbin/quotaon/quotaon.8 b/usr/src/usr.sbin/quotaon/quotaon.8 index 2460ad2f6f..56fa85d549 100644 --- a/usr/src/usr.sbin/quotaon/quotaon.8 +++ b/usr/src/usr.sbin/quotaon/quotaon.8 @@ -1,122 +1,113 @@ -.\" Copyright (c) 1983, 1990 Regents of the University of California. +.\" Copyright (c) 1983, 1990, 1991 Regents of the University of California. .\" All rights reserved. .\" .\" This code is derived from software contributed to Berkeley by .\" Robert Elz at The University of Melbourne. -.\" .\" %sccs.include.redist.man% .\" -.\" @(#)quotaon.8 6.6 (Berkeley) %G% +.\" @(#)quotaon.8 6.7 (Berkeley) %G% .\" -.TH QUOTAON 8 "" -.UC 5 -.SH NAME -quotaon, quotaoff \- turn filesystem quotas on and off -.SH SYNOPSIS -.B quotaon -[ -.B \-g -] [ -.B \-u -] [ -.B \-v -] -filesystem ... -.br -.B quotaon -[ -.B \-g -] [ -.B \-u -] [ -.B \-v -] -.B \-a -.br -.B quotaoff -[ -.B \-g -] [ -.B \-u -] [ -.B \-v -] -filesystem ... -.br -.B quotaoff -[ -.B \-g -] [ -.B \-u -] [ -.B \-v -] -.B \-a -.br -.SH DESCRIPTION -.I Quotaon +.Dd +.Dt QUOTAON 8 +.Os BSD 4.2 +.Sh NAME +.Nm quotaon , +.Nm quotaoff +.Nd turn filesystem quotas on and off +.Sh SYNOPSIS +.Nm quotaon +.Op Fl g +.Op Fl u +.Op Fl v +.Ar filesystem Ar ... +.Nm quotaon +.Op Fl g +.Op Fl u +.Op Fl v +.Fl a +.Nm quotaoff +.Op Fl g +.Op Fl u +.Op Fl v +.Ar filesystem Ar ... +.Nm quotaoff +.Op Fl g +.Op Fl u +.Op Fl v +.Fl a +.Sh DESCRIPTION +.Nm Quotaon announces to the system that disk quotas should be enabled on one or more filesystems. +.Nm Quotaoff +announces to the system that the specified +filesystems should have any disk quotas +diskquotas turned off. The filesystems specified must have entries in -.I /etc/fstab +.Pa /etc/fstab and be mounted. -.I Quotaon +.Nm Quotaon expects each filesystem to have quota files named -.I quota.user +.Pa quota.user and -.I quota.group +.Pa quota.group which are located at the root of the associated file system. These defaults may be overridden in -.I /etc/fstab . +.Pa /etc/fstab . By default both user and group quotas are enabled. -The optional \fI-g\fP flag specifies that only group quotas should be enabled. -The optional \fI-u\fP flag specifies that only user quotas should be enabled. -Specifying both \fI-g\fP and \fI-u\fP is equivalent to the default. -.PP +.Pp +Available options: +.Bl -tag -width Ds +.It Fl a If the -.B \-a +.Fl a flag is supplied in place of any filesystem names, -.I quotaon -will enable all the filesystems indicated in -.I /etc/fstab +.Nm quotaon Ns / Ns quotaoff +will enable/disable all the filesystems indicated in +.Pa /etc/fstab to be read-write with disk quotas. By default only the types of quotas listed in -.I /etc/fstab +.Pa /etc/fstab are enabled. -The optional \fI-g\fP flag specifies that only group quotas listed in -.I /etc/fstab -should be enabled. -The optional \fI-u\fP flag specifies that only user quotas listed in -.I /etc/fstab -should be enabled. -Specifying both \fI-g\fP and \fI-u\fP is equivalent to the default. -.PP -.I Quotaoff -announces to the system that the specified filesystems should have -any disk quotas turned off. -If the -.B \-a -flag is supplied in place of any filesystem names, -.I quotaoff -will turn off quotas on all the filesystems indicated in -.I /etc/fstab -to be read-write with disk quotas. -The \fI-g\fP and \fI-u\fP flags work analogously with quotaon. -.PP -The \fI-v\fP flag causes -.I quotaon +.It Fl g +Only group quotas listed in +.Pa /etc/fstab +should be enabled/disabled. +.It Fl u +Only user quotas listed in +.Pa /etc/fstab +should be enabled/disabled. +.It Fl v +Causes +.Nm quotaon and -.I quotaoff +.Nm quotaoff to print a message for each filesystem where quotas are turned on or off. -.SH FILES -.DT -\fIquota.user\fP at the filesystem root with user quotas -.br -\fIquota.group\fP at the filesystem root with group quotas -.br -/etc/fstab filesystem table -.SH "SEE ALSO" -quota(1), -quotactl(2), -fstab(5), -edquota(8), quotacheck(8), repquota(8) +.El +.Pp +Specifying both +.Fl g +and +.Fl u +is equivalent to the default. +.Sh FILES +.Bl -tag -width quota.group -compact +.It Pa quota.user +at the filesystem root with user quotas +.It Pa quota.group +at the filesystem root with group quotas +.It Pa /etc/fstab +filesystem table +.El +.Sh SEE ALSO +.Xr quota 1 , +.Xr quotactl 2 , +.Xr fstab 5 , +.Xr edquota 8 , +.Xr quotacheck 8 , +.Xr repquota 8 +.Sh HISTORY +The +.Nm +command appeared in +.Bx 4.2 . diff --git a/usr/src/usr.sbin/repquota/repquota.8 b/usr/src/usr.sbin/repquota/repquota.8 index 52ca598be7..7e85c33abc 100644 --- a/usr/src/usr.sbin/repquota/repquota.8 +++ b/usr/src/usr.sbin/repquota/repquota.8 @@ -1,4 +1,4 @@ -.\" Copyright (c) 1983, 1990 Regents of the University of California. +.\" Copyright (c) 1983, 1990, 1991 Regents of the University of California. .\" All rights reserved. .\" .\" This code is derived from software contributed to Berkeley by @@ -6,67 +6,72 @@ .\" .\" %sccs.include.redist.man% .\" -.\" @(#)repquota.8 6.5 (Berkeley) %G% +.\" @(#)repquota.8 6.6 (Berkeley) %G% .\" -.TH REPQUOTA 8 "" -.UC 5 -.SH NAME -repquota \- summarize quotas for a file system -.SH SYNOPSIS -.B repquota -[ -.B \-v -] [ -.B \-g -] [ -.B \-u -] -filesystem ... -.br -.B repquota -[ -.B \-v -] [ -.B \-g -] [ -.B \-u -] -.B \-a -.br -.SH DESCRIPTION -.I Repquota +.Dd +.Dt REPQUOTA 8 +.Os BSD 4.2 +.Sh NAME +.Nm repquota +.Nd summarize quotas for a file system +.Sh SYNOPSIS +.Nm repquota +.Op Fl g +.Op Fl u +.Op Fl v +.Ar filesystem Ar ... +.Nm repquota +.Op Fl g +.Op Fl u +.Op Fl v +.Fl a +.Sh DESCRIPTION +.Nm Repquota prints a summary of the disk usage and quotas for the specified file systems. -If the \fI-a\fP flag is used, -.I repquota -prints the quotas of all the filesystems listed in -.IR /etc/fstab . -.PP -By default both user and group quotas are printed if they exist. -The optional \fI-g\fP flag specifies that only group quotas should be printed. -The optional \fI-u\fP flag specifies that only user quotas should be printed. -Specifying both \fI-g\fP and \fI-u\fP is equivalent to the default. -.PP +.Pp +Available options: +.Bl -tag -width Ds +.It Fl a +Print the quotas of all the filesystems listed in +.Pa /etc/fstab . +.It Fl g +Print only group quotas (the default is to print both +group and user quotas if they exist). +.It Fl u +Print only user quotas (the default is to print both +group and user quotas if they exist). +.It Fl v +Print a header line before printing each filesystem quotas. +.El +.Pp For each user or group, the current number files and amount of space (in kilobytes) is printed, along with any quotas created with -.IR edquota (8). -If the \fI-v\fP flag is specified, -a header line is printed preceding each filesystems quotas. -.PP +.Xr edquota 8 . +.Pp Only members of the operator group or the super-user may use this command. -.SH FILES -.DT -\fIquota.user\fP at the filesystem root with user quotas -.br -\fIquota.group\fP at the filesystem root with group quotas -.br -/etc/fstab for file system names and locations -.SH SEE ALSO -quota(1), -quotactl(2), -fstab(5), -edquota(8), quotacheck(8), quotaon(8) -.SH DIAGNOSTICS +.Sh FILES +.Bl -tag -width quota.group -compact +.It Pa quota.user +at the filesystem root with user quotas +.It Pa quota.group +at the filesystem root with group quotas +.It Pa /etc/fstab +for file system names and locations +.El +.Sh SEE ALSO +.Xr quota 1 , +.Xr quotactl 2 , +.Xr fstab 5 , +.Xr edquota 8 , +.Xr quotacheck 8 , +.Xr quotaon 8 +.Sh DIAGNOSTICS Various messages about inaccessible files; self-explanatory. +.Sh HISTORY +The +.Nm +command appeared in +.Bx 4.2 . diff --git a/usr/src/usr.sbin/rmt/rmt.8 b/usr/src/usr.sbin/rmt/rmt.8 index c7e11182b6..458cae8e7c 100644 --- a/usr/src/usr.sbin/rmt/rmt.8 +++ b/usr/src/usr.sbin/rmt/rmt.8 @@ -1,151 +1,191 @@ -.\" Copyright (c) 1983 The Regents of the University of California. +.\" Copyright (c) 1983, 1991 The Regents of the University of California. .\" All rights reserved. .\" .\" %sccs.include.redist.man% .\" -.\" @(#)rmt.8 6.4 (Berkeley) %G% +.\" @(#)rmt.8 6.5 (Berkeley) %G% .\" -.TH RMT 8 "" -.UC 5 -.SH NAME -rmt \- remote magtape protocol module -.SH SYNOPSIS -.B /etc/rmt -.SH DESCRIPTION -.I Rmt +.Dd +.Dt RMT 8 +.Os BSD 4.2 +.Sh NAME +.Nm rmt +.Nd remote magtape protocol module +.Sh SYNOPSIS +.Nm rmt +.Sh DESCRIPTION +.Nm Rmt is a program used by the remote dump and restore programs in manipulating a magnetic tape drive through an interprocess communication connection. -.I Rmt +.Nm Rmt is normally started up with an -.IR rexec (3X) +.Xr rexec 3 or -.IR rcmd (3X) +.Xr rcmd 3 call. -.PP +.Pp The -.I rmt +.Nm rmt program accepts requests specific to the manipulation of magnetic tapes, performs the commands, then responds with -a status indication. All responses are in ASCII and in +a status indication. All responses are in +.Tn ASCII +and in one of two forms. -Successful commands have responses of -.IP -.BI A number \en -.PP -where -.I number -is an ASCII representation of a decimal number. -Unsuccessful commands are responded to with -.PP -.IP -.BI E error-number \en error-message \en -.PP -where -.I error-number +Successful commands have responses of: +.Bd -filled -offset indent +.Sm off +.Sy A Ar number No \en +.Sm on +.Ed +.Pp +.Ar Number +is an +.Tn ASCII +representation of a decimal number. +Unsuccessful commands are responded to with: +.Bd -filled -offset indent +.Sm off +.Xo Sy E Ar error-number +.No \en Ar error-message +.No \en +.Xc +.Sm on +.Ed +.Pp +.Ar Error-number is one of the possible error numbers described in -.IR intro (2) +.Xr intro 2 and -.I error-message +.Ar error-message is the corresponding error string as printed from a call to -.IR perror (3). +.Xr perror 3 . The protocol is comprised of the following commands, which are sent as indicated - no spaces are supplied between the command and its arguments, or between its arguments, and -.B \en +.Ql \en indicates that a newline should be supplied: -.TP 15 -.BI O device \en mode \en +.Bl -tag -width Ds +.Sm off +.It Xo Sy \&O Ar device +.No \en Ar mode No \en +.Xc Open the specified -.I device +.Ar device using the indicated -.IR mode . -.I Device +.Ar mode . +.Ar Device is a full pathname and -.I mode -is an ASCII representation of a decimal +.Ar mode +is an +.Tn ASCII +representation of a decimal number suitable for passing to -.IR open (2). +.Xr open 2 . If a device had already been opened, it is closed before a new open is performed. -.TP 15 -.BI C device \en +.It Xo Sy C Ar device No \en +.Xc Close the currently open device. The -.I device +.Ar device specified is ignored. -.TP 15 -.BI L whence \en offset \en +.It Xo Sy L +.Ar whence No \en +.Ar offset No \en +.Xc +.Sm on Perform an -.IR lseek (2) +.Xr lseek 2 operation using the specified parameters. The response value is that returned from the -.I lseek +.Xr lseek call. -.TP 15 -.BI W count \en +.Sm off +.It Sy W Ar count No \en +.Sm on Write data onto the open device. -.I Rmt +.Nm Rmt reads -.I count +.Ar count bytes from the connection, aborting if a premature end-of-file is encountered. The response value is that returned from the -.IR write (2) +.Xr write 2 call. -.TP 15 -.BI R count \en +.Sm off +.It Sy R Ar count No \en +.Sm on Read -.I count +.Ar count bytes of data from the open device. If -.I count +.Ar count exceeds the size of the data buffer (10 kilobytes), it is truncated to the data buffer size. -.I Rmt +.Nm rmt then performs the requested -.IR read (2) +.Xr read 2 and responds with -.BI A count-read \en +.Sm off +.Sy A Ar count-read No \en +.Sm on if the read was successful; otherwise an error in the standard format is returned. If the read was successful, the data read is then sent. -.TP 15 -.BI I operation \en count \en -Perform a MTIOCOP -.IR ioctl (2) +.Sm off +.It Xo Sy I Ar operation +.No \en Ar count No \en +.Xc +.Sm on +Perform a +.Dv MTIOCOP +.Xr ioctl 2 command using the specified parameters. The parameters are interpreted as the -ASCII representations of the decimal values +.Tn ASCII +representations of the decimal values to place in the -.I mt_op +.Ar mt_op and -.I mt_count +.Ar mt_count fields of the structure used in the -.I ioctl +.Xr ioctl call. The return value is the -.I count +.Ar count parameter when the operation is successful. -.TP 15 -.B S +.It Sy S Return the status of the open device, as -obtained with a MTIOCGET -.I ioctl +obtained with a +.Dv MTIOCGET +.Xr ioctl call. If the operation was successful, an ``ack'' is sent with the size of the status buffer, then the status buffer is sent (in binary). -.PP +.El +.Sm on +.Pp Any other command causes -.I rmt +.Nm rmt to exit. -.SH DIAGNOSTICS +.Sh DIAGNOSTICS All responses are of the form described above. -.SH "SEE ALSO" -rcmd(3), rexec(3), mtio(4), rdump(8), rrestore(8) -.SH BUGS +.Sh SEE ALSO +.Xr rcmd 3 , +.Xr rexec 3 , +.Xr mtio 4 , +.Xr rdump 8 , +.Xr rrestore 8 +.Sh BUGS People tempted to use this for a remote file access protocol are discouraged. +.Sh HISTORY +The +.Nm +command appeared in +.Bx 4.2 . diff --git a/usr/src/usr.sbin/rwhod/rwhod.8 b/usr/src/usr.sbin/rwhod/rwhod.8 index 211f6535d0..6bc8ababcf 100644 --- a/usr/src/usr.sbin/rwhod/rwhod.8 +++ b/usr/src/usr.sbin/rwhod/rwhod.8 @@ -1,50 +1,50 @@ -.\" Copyright (c) 1983 The Regents of the University of California. +.\" Copyright (c) 1983, 1991 The Regents of the University of California. .\" All rights reserved. .\" .\" %sccs.include.redist.man% .\" -.\" @(#)rwhod.8 6.4 (Berkeley) %G% +.\" @(#)rwhod.8 6.5 (Berkeley) %G% .\" -.TH RWHOD 8 "" -.UC 5 -.SH NAME -rwhod \- system status server -.SH SYNOPSIS -.B rwhod -.SH DESCRIPTION -.I Rwhod +.Dd +.Dt RWHOD 8 +.Os BSD 4.2 +.Sh NAME +.Nm rwhod +.Nd system status server +.Sh SYNOPSIS +.Nm rwhod +.Sh DESCRIPTION +.Nm Rwhod is the server which maintains the database used by the -.IR rwho (1C) +.Xr rwho 1 and -.IR ruptime (1C) +.Xr ruptime 1 programs. Its operation is predicated on the ability to -.I broadcast +.Em broadcast messages on a network. -.PP -.I Rwhod +.Pp +.Nm Rwhod operates as both a producer and consumer of status information. As a producer of information it periodically queries the state of the system and constructs status messages which are broadcast on a network. As a consumer of information, it listens for other -.I rwhod +.Nm rwhod servers' status messages, validating them, then recording them in a collection of files located in the directory -.IR /var/rwho . -.PP +.Pa /var/rwho . +.Pp The server transmits and receives messages at the port indicated in the ``rwho'' service specification; see -.IR services (5). +.Xr services 5 . The messages sent and received, are of the form: -.PP -.nf -.ta 0.5i 1.0i 1.5i +.Bd -literal -offset indent struct outmp { char out_line[8]; /* tty name */ char out_name[8]; /* user id */ long out_time; /* time on */ }; -.sp + struct whod { char wd_vers; char wd_type; @@ -59,52 +59,62 @@ struct whod { int we_idle; } wd_we[1024 / sizeof (struct whoent)]; }; -.fi -.PP +.Ed +.Pp All fields are converted to network byte order prior to transmission. The load averages are as calculated by the -.IR w (1) +.Xr w 1 program, and represent load averages over the 5, 10, and 15 minute intervals prior to a server's transmission; they are multiplied by 100 for representation in an integer. The host name included is that returned by the -.IR gethostname (2) +.Xr gethostname 2 system call, with any trailing domain name omitted. The array at the end of the message contains information about the users logged in to the sending machine. This information includes the contents of the -.IR utmp (5) +.Xr utmp 5 entry for each non-idle terminal line and a value indicating the time in seconds since a character was last received on the terminal line. -.PP +.Pp Messages received by the -.I rwho +.Xr rwho server are discarded unless they originated at an -.I rwho +.Xr rwho server's port. In addition, if the host's name, as specified -in the message, contains any unprintable ASCII characters, the +in the message, contains any unprintable +.Tn ASCII +characters, the message is discarded. Valid messages received by -.I rwhod +.Nm rwhod are placed in files named -.IR whod . hostname +.Pa whod.hostname in the directory -.IR /var/rwho . +.Pa /var/rwho . These files contain only the most recent message, in the format described above. -.PP +.Pp Status messages are generated approximately once every 3 minutes. -.I Rwhod +.Nm Rwhod performs an -.IR nlist (3) -on /vmunix every 30 minutes to guard against +.Xr nlist 3 +on +.Pa /vmunix +every 30 minutes to guard against the possibility that this file is not the system image currently operating. -.SH "SEE ALSO" -rwho(1), ruptime(1) -.SH BUGS +.Sh SEE ALSO +.Xr rwho 1 , +.Xr ruptime 1 +.Sh BUGS There should be a way to relay status information between networks. Status information should be sent only upon request rather than continuously. People often interpret the server dying or network communtication failures as a machine going down. +.Sh HISTORY +The +.Nm +command appeared in +.Bx 4.2 . diff --git a/usr/src/usr.sbin/sendmail/src/sendmail.8 b/usr/src/usr.sbin/sendmail/src/sendmail.8 index 5f617fdaac..37f598cb62 100644 --- a/usr/src/usr.sbin/sendmail/src/sendmail.8 +++ b/usr/src/usr.sbin/sendmail/src/sendmail.8 @@ -1,47 +1,42 @@ -.\" Copyright (c) 1988 The Regents of the University of California. +.\" Copyright (c) 1988, 1991 The Regents of the University of California. .\" All rights reserved. .\" .\" %sccs.include.redist.man% .\" -.\" @(#)sendmail.8 6.4 (Berkeley) %G% +.\" @(#)sendmail.8 6.5 (Berkeley) %G% .\" -.TH SENDMAIL 8 "" -.UC 4 -.SH NAME -sendmail \- send mail over the internet -.SH SYNOPSIS -.B sendmail -[ -flags -] [ -address ... -] -.PP -.B newaliases -.PP -.B mailq -[ -.B \-v -] -.SH DESCRIPTION -.I Sendmail +.Dd +.Dt SENDMAIL 8 +.Os BSD 4 +.Sh NAME +.Nm sendmail +.Nd send mail over the internet +.Sh SYNOPSIS +.Nm sendmail +.Op Ar flags +.Op Ar address ... +.Nm newaliases +.Nm mailq +.Op Fl v +.Sh DESCRIPTION +.Nm Sendmail sends a message to one or more -.IR recipients , +.Em recipients , routing the message over whatever networks are necessary. -.I Sendmail +.Nm Sendmail does internetwork forwarding as necessary to deliver the message to the correct place. -.PP -.I Sendmail +.Pp +.Nm Sendmail is not intended as a user interface routine; other programs provide user-friendly front ends; -.I sendmail +.Nm sendmail is used only to deliver pre-formatted messages. -.PP +.Pp With no flags, -.I sendmail +.Nm sendmail reads its standard input up to an end-of-file or a line consisting only of a single dot @@ -49,7 +44,7 @@ and sends a copy of the message found there to all of the addresses listed. It determines the network(s) to use based on the syntax and contents of the addresses. -.PP +.Pp Local addresses are looked up in a file and aliased appropriately. Aliasing can be prevented by preceding the address @@ -59,84 +54,80 @@ expansions, e.g., if `john' sends to `group', and `group' includes `john' in the expansion, then the letter will not be delivered to `john'. -.PP +.Pp Flags are: -.TP 1.2i -.B \-ba -Go into \s-1ARPANET\s0 mode. +.Bl -tag -width Fl +.It Fl ba +Go into +.Tn ARPANET +mode. All input lines must end with a CR-LF, and all messages will be generated with a CR-LF at the end. Also, the ``From:'' and ``Sender:'' fields are examined for the name of the sender. -.TP 1.2i -.B \-bd -Run as a daemon. This requires Berkeley IPC. -.I Sendmail +.It Fl bd +Run as a daemon. This requires Berkeley +.Tn IPC . +.Nm Sendmail will fork and run in background -listening on socket 25 for incoming SMTP connections. +listening on socket 25 for incoming +.Tn SMTP +connections. This is normally run from -.IR /etc/rc . -.TP 1.2i -.B \-bi +.Pa /etc/rc . +.It Fl bi Initialize the alias database. -.TP 1.2i -.B \-bm +.It Fl bm Deliver mail in the usual way (default). -.TP 1.2i -.B \-bp +.It Fl bp Print a listing of the queue. -.TP 1.2i -.B \-bs -Use the \s-2SMTP\s0 protocol as described in RFC821 +.It Fl bs +Use the +.Tn SMTP +protocol as described in +.Tn RFC821 on standard input and output. This flag implies all the operations of the -.B \-ba -flag that are compatible with \s-2SMTP\s0. -.TP 1.2i -.B \-bt +.Fl ba +flag that are compatible with +.Tn SMTP . +.It Fl bt Run in address test mode. This mode reads addresses and shows the steps in parsing; it is used for debugging configuration tables. -.TP 1.2i -.B \-bv +.It Fl bv Verify names only \- do not try to collect or deliver a message. Verify mode is normally used for validating users or mailing lists. -.TP 1.2i -.B \-bz +.It Fl bz Create the configuration freeze file. -.TP 1.2i -.BI \-C file +.It Fl C Ns Ar file Use alternate configuration file. -.I Sendmail +.Nm Sendmail refuses to run as root if an alternate configuration file is specified. The frozen configuration file is bypassed. -.TP 1.2i -.BI \-d X +.It Fl d Ns Ar X Set debugging value to -.I X. -.TP 1.2i -.BI \-F fullname +.Ar X . +.It Fl F Ns Ar fullname Set the full name of the sender. -.TP 1.2i -.BI \-f name +.It Fl f Ns Ar name Sets the name of the ``from'' person (i.e., the sender of the mail). -.B \-f +.Fl f can only be used by ``trusted'' users (normally -.I root, -.I daemon, +.Em root , +.Em daemon , and -.I network) +.Em network ) or if the person you are trying to become is the same as the person you are. -.TP 1.2i -.BI \-h N +.It Fl h Ns Ar N Set the hop count to -.I N. +.Ar N . The hop count is incremented every time the mail is processed. When it reaches a limit, @@ -144,139 +135,144 @@ the mail is returned with an error message, the victim of an aliasing loop. If not specified, ``Received:'' lines in the message are counted. -.TP 1.2i -.B \-n +.It Fl n Don't do aliasing. -.TP 1.2i -.BI \-o x\|value +.It Fl o Ns Ar x Em value Set option -.I x +.Ar x to the specified -.I value. +.Em value . Options are described below. -.TP 1.2i -.BI \-q[ time ] +.It Fl q Ns Bq Ar time Processed saved messages in the queue at given intervals. If -.I time +.Ar time is omitted, process the queue once. -.I Time +.Xr Time is given as a tagged number, -with `s' being seconds, -`m' being minutes, -`h' being hours, -`d' being days, +with +.Ql s +being seconds, +.Ql m +being minutes, +.Ql h +being hours, +.Ql d +being days, and -`w' being weeks. +.Ql w +being weeks. For example, -``\-q1h30m'' or ``\-q90m'' +.Ql \-q1h30m +or +.Ql \-q90m would both set the timeout to one hour thirty minutes. If -.I time +.Ar time is specified, -.I sendmail +.Nm sendmail will run in background. This option can be used safely with -.BR \-bd . -.TP 1.2i -.BI \-r name +.Fl bd . +.It Fl r Ns Ar name An alternate and obsolete form of the -.B \-f +.Fl f flag. -.TP 1.2i -.B \-t +.It Fl t Read message for recipients. To:, Cc:, and Bcc: lines will be scanned for recipient addresses. The Bcc: line will be deleted before transmission. Any addresses in the argument list will be suppressed, that is, they will -.I not +.Em not receive copies even if listed in the message header. -.TP 1.2i -.B \-v +.It Fl v Go into verbose mode. Alias expansions will be announced, etc. -.PP +.El +.Pp There are also a number of processing options that may be set. Normally these will only be used by a system administrator. Options may be set either on the command line using the -.B \-o +.Fl o flag or in the configuration file. These are described in detail in the -.ul -Sendmail Installation and Operation Guide. +.%T Sendmail Installation and Operation Guide. The options are: -.TP 1.2i -.RI A file +.Bl -tag -width Fl +.It Li A Ns Ar file Use alternate alias file. -.TP 1.2i -c +.It Li c On mailers that are considered ``expensive'' to connect to, don't initiate immediate connection. This requires queueing. -.TP 1.2i -.RI d x +.It Li d Ns Ar x Set the delivery mode to -.I x. +.Ar x . Delivery modes are -`i' for interactive (synchronous) delivery, -`b' for background (asynchronous) delivery, +.Ql i +for interactive (synchronous) delivery, +.Ql b +for background (asynchronous) delivery, and -`q' for queue only \- i.e., +.Ql q +for queue only \- i.e., actual delivery is done the next time the queue is run. -.TP 1.2i -D +.It Li D Try to automatically rebuild the alias database if necessary. -.TP 1.2i -.RI e x +.It Li e Ns Ar x Set error processing to mode -.I x. +.Ar x . Valid modes are -`m' to mail back the error message, -`w' to ``write'' back the error message +.Ql m +to mail back the error message, +.Ql w +to ``write'' back the error message (or mail it back if the sender is not logged in), -`p' to print the errors on the terminal +.Ql p +to print the errors on the terminal (default), -`q' to throw away error messages +.Ql q +to throw away error messages (only exit status is returned), -and `e' +and +.Ql e to do special processing for the BerkNet. If the text of the message is not mailed back by -modes `m' or `w' +modes +.Ql m +or +.Ql w and if the sender is local to this machine, a copy of the message is appended to the file -``dead.letter'' +.Pa dead.letter in the sender's home directory. -.TP 1.2i -.RI F mode +.It Li F Ns Ar mode The mode to use when creating temporary files. -.TP 1.2i -f -Save UNIX-style From lines at the front of messages. -.TP 1.2i -.RI g N +.It Li f +Save +.Tn UNIX Ns \-style +From lines at the front of messages. +.It Li g Ar N The default group id to use when calling mailers. -.TP 1.2i -.RI H file -The SMTP help file. -.TP 1.2i -i +.It Li H Ns Ar file +The +.Tn SMTP +help file. +.It Li i Do not take dots on a line by themselves as a message terminator. -.TP 1.2i -.RI L n +.It Li L Ns Ar n The log level. -.TP 1.2i -m +.It Li m Send to ``me'' (the sender) also if I am in an alias expansion. -.TP 1.2i -o +.It Li o If set, this message may have old style headers. If not set, @@ -284,40 +280,36 @@ this message is guaranteed to have new style headers (i.e., commas instead of spaces between addresses). If set, an adaptive algorithm is used that will correctly determine the header format in most cases. -.TP 1.2i -.RI Q queuedir +.It Li Q Ns Ar queuedir Select the directory in which to queue messages. -.TP 1.2i -.RI r timeout +.It Li r Ns Ar timeout The timeout on reads; if none is set, -.I sendmail +.Nm sendmail will wait forever for a mailer. -This option violates the word (if not the intent) of the SMTP specification, +This option violates the word (if not the intent) of the +.Tn SMTP +specification, show the timeout should probably be fairly large. -.TP 1.2i -.RI S file +.It Li S Ns Ar file Save statistics in the named file. -.TP 1.2i -s +.It Li s Always instantiate the queue file, even under circumstances where it is not strictly necessary. This provides safety against system crashes during delivery. -.TP 1.2i -.RI T time +.It Li T Ns Ar time Set the timeout on undelivered messages in the queue to the specified time. After delivery has failed (e.g., because of a host being down) for this amount of time, failed messages will be returned to the sender. The default is three days. -.TP 1.2i -.RI t stz,dtz +.It Li t Ns Ar stz , Ar dtz Set the name of the time zone. -.TP 1.2i -.RI u N +.It Li u Ns Ar N Set the default user id for mailers. -.PP +.El +.Pp In aliases, the first character of a name may be a vertical bar to cause interpretation of @@ -325,100 +317,118 @@ the rest of the name as a command to pipe the mail to. It may be necessary to quote the name to keep -.I sendmail +.Nm sendmail from suppressing the blanks from between arguments. For example, a common alias is: -.PP - msgs: "|/usr/bin/msgs -s" -.PP -Aliases may also have the syntax ``:include:\c -.IR filename '' +.Pp +.Bd -literal -offset indent -compact +msgs: "|/usr/bin/msgs -s" +.Ed +.Pp +Aliases may also have the syntax +.Dq :include: Ns Ar filename to ask -.I sendmail +.Xr sendmail to read the named file for a list of recipients. For example, an alias such as: -.PP - poets: ":include:/usr/local/lib/poets.list" -.PP +.Pp +.Bd -literal -offset indent -compact +poets: ":include:/usr/local/lib/poets.list" +.Ed +.Pp would read -.I /usr/local/lib/poets.list +.Pa /usr/local/lib/poets.list for the list of addresses making up the group. -.PP -.I Sendmail +.Pp +.Nm Sendmail returns an exit status describing what it did. The codes are defined in -.RI < sysexits.h > -.ta 3n +\w'EX_UNAVAILABLE'u+3n -.de XX -.ti \n(.iu -.. -.in +\w'EX_UNAVAILABLE'u+6n -.XX - EX_OK Successful completion on all addresses. -.XX - EX_NOUSER User name not recognized. -.XX - EX_UNAVAILABLE Catchall meaning necessary resources +.Aq Pa sysexits.h : +.Bl -tag -width EX_UNAVAILABLE -compact -offset indent +.It Dv EX_OK +Successful completion on all addresses. +.It Dv EX_NOUSER +User name not recognized. +.It Dv EX_UNAVAILABLE +Catchall meaning necessary resources were not available. -.XX - EX_SYNTAX Syntax error in address. -.XX - EX_SOFTWARE Internal software error, +.It Dv EX_SYNTAX +Syntax error in address. +.It Dv EX_SOFTWARE +Internal software error, including bad arguments. -.XX - EX_OSERR Temporary operating system error, -such as \*(lqcannot fork\*(rq. -.XX - EX_NOHOST Host name not recognized. -.XX - EX_TEMPFAIL Message could not be sent immediately, +.It Dv EX_OSERR +Temporary operating system error, +such as +.Dq cannot fork . +.It Dv EX_NOHOST +Host name not recognized. +.It Dv EX_TEMPFAIL +Message could not be sent immediately, but was queued. -.PP +.El +.Pp If invoked as -.I newaliases, -.I sendmail +.Nm newaliases , +.Nm sendmail will rebuild the alias database. If invoked as -.I mailq, -.I sendmail +.Nm mailq , +.Nm sendmail will print the contents of the mail queue. -.SH FILES -Except for -/etc/sendmail.cf, -these pathnames are all specified in -/etc/sendmail.cf. +.Sh FILES +Except for the file +.Pa /etc/sendmail.cf +itself, +the following pathnames are all specified in +.Pa /etc/sendmail.cf. Thus, these values are only approximations. -.PP -.if t .ta 2i -.if n .ta 3i -/etc/aliases raw data for alias names -.br -/etc/aliases.pag -.br -/etc/aliases.dir data base of alias names -.br -/etc/sendmail.cf configuration file -.br -/etc/sendmail.fc frozen configuration -.br -/usr/share/misc/sendmail.hf help file -.br -/var/log/sendmail.st collected statistics -.br -/var/spool/mqueue/* temp files -.SH SEE\ ALSO -binmail(1), mail(1), rmail(1), syslog(3), -aliases(5), mailaddr(7), rc(8); -.br -DARPA Internet Request For Comments -RFC819, RFC821, RFC822; -.br -.ul -Sendmail \- An Internetwork Mail Router -(SMM:9); -.br -.ul -Sendmail Installation and Operation Guide -(SMM:8) +.Pp +.Bl -tag -width /usr/lib/sendmail.fc -compact +.It Pa /etc/aliases +raw data for alias names +.It Pa /etc/aliases.pag +.It Pa /etc/aliases.dir +data base of alias names +.It Pa /etc/sendmail.cf +configuration file +.It Pa /etc/sendmail.fc +frozen configuration +.It Pa /etc/sendmail.hf +help file +.It Pa /var/log/sendmail.st +collected statistics +.It Pa /var/spool/mqueue/* +temp files +.El +.Sh SEE ALSO +.Xr binmail 1 , +.Xr mail 1 , +.Xr rmail 1 , +.Xr syslog 3 , +.Xr aliases 5 , +.Xr mailaddr 7 , +.Xr rc 8 ; +.Pp +DARPA +Internet Request For Comments +.%T RFC819 , +.%T RFC821 , +.%T RFC822 . +.Rs +.%T Sendmail \- An Internetwork Mail Router +.%V SMM +.%N \&No. 9 +.Re +.Rs +.%T Sendmail Installation and Operation Guide +.%V SMM +.%N \&No. 8 +.Re +.Sh HISTORY +The +.Nm +command appeared in +.Bx 4.2 . diff --git a/usr/src/usr.sbin/sliplogin/sliplogin.8 b/usr/src/usr.sbin/sliplogin/sliplogin.8 index 5c075e5640..d64d2cfa45 100644 --- a/usr/src/usr.sbin/sliplogin/sliplogin.8 +++ b/usr/src/usr.sbin/sliplogin/sliplogin.8 @@ -1,175 +1,190 @@ -.\" Copyright (c) 1990 The Regents of the University of California. +.\" Copyright (c) 1990, 1991 The Regents of the University of California. .\" All rights reserved. .\" .\" %sccs.include.redist.man% .\" -.\" @(#)sliplogin.8 5.2 (Berkeley) %G% +.\" @(#)sliplogin.8 5.3 (Berkeley) %G% .\" -.TH SLIPLOGIN 8 "" -.SH NAME -sliplogin \- attach a serial line network interface -.SH SYNOPSIS -.B sliplogin -[ -.I loginname -] -.SH DESCRIPTION -.B sliplogin +.Dd +.Dt SLIPLOGIN 8 +.Os +.Sh NAME +.Nm sliplogin +.Nd attach a serial line network interface +.Sh SYNOPSIS +.Nm sliplogin +.Op Ar loginname +.Sh DESCRIPTION +.Nm Sliplogin is used to turn the terminal line on standard input into -a Serial Line IP (SLIP) link to a remote host. To do this, the program +a Serial Line IP +.Pq Tn SLIP +link to a remote host. To do this, the program searches the file -.B /etc/slip.hosts +.Pa /etc/slip.hosts for an entry matching -.I loginname +.Ar loginname (which defaults to the current login name if omitted). If a matching entry is found, the line is configured appropriately -for slip (8-bit transparent i/o) and converted to SLIP line +for slip (8-bit transparent i/o) and converted to +.Tn SLIP +line discipline. Then a shell script is invoked to initialize the slip -interface with the appropriate local and remote IP address, +interface with the appropriate local and remote +.Tn IP +address, netmask, etc. -.PP +.Pp The usual initialization script is -.B /etc/slip.login +.Pa /etc/slip.login but, if particular hosts need special initialization, the file -.BI /etc/slip.login. loginname +.Pa /etc/slip.login. Ns Ar loginname will be executed instead if it exists. The script is invoked with the parameters -.TP -.I slipunit +.Bl -tag -width slipunit +.It Em slipunit The unit number of the slip interface assigned to this line. E.g., -.B 0 +.Sy 0 for -.BR sl0 . -.TP -.I speed +.Sy sl0 . +.It Em speed The speed of the line. -.TP -.I args +.It Em args The arguments from the -.B /etc/slip.hosts +.Pa /etc/slip.hosts entry, in order starting with -.IR loginname . -.PP +.Ar loginname . +.El +.Pp Only the super-user may attach a network interface. The interface is automatically detached when the other end hangs up or the -.B sliplogin +.Nm sliplogin process dies. If the kernel slip module has been configured for it, all routes through that interface will also disappear at the same time. If there is other processing a site would like done on hangup, the file -.B /etc/slip.logout +.Pa /etc/slip.logout or -.BI /etc/slip.logout. loginname +.Pa /etc/slip.logout. Ns Ar loginname is executed if it exists. It is given the same arguments as the login script. -.SS Format of /etc/slip.hosts +.Ss Format of /etc/slip.hosts Comments (lines starting with a `#') and blank lines are ignored. Other lines must start with a -.I loginname +.Ar loginname but the remaining arguments can be whatever is appropriate for the -.B slip.login +.Pa slip.login file that will be executed for that name. Arguments are separated by white space and follow normal -.BR sh (1) +.Xr sh 1 quoting conventions (however, -.I loginname +.Ar loginname cannot be quoted). Usually, lines have the form -.RS -.I +.Bd -literal -offset indent loginname local-address remote-address netmask opt-args -.RE +.Ed +.Pp where -.I local-address +.Em local-address and -.I remote-address +.Em remote-address are the IP host names or addresses of the local and remote ends of the slip line and -.I netmask +.Em netmask is the appropriate IP netmask. These arguments are passed directly to -.BR ifconfig (8). -.I Opt-args +.Xr ifconfig 8 . +.Em Opt-args are optional arguments used to configure the line. -.SH EXAMPLE +.Sh EXAMPLE The normal use of -.B sliplogin +.Nm sliplogin is to create a -.B /etc/passwd +.Pa /etc/passwd entry for each legal, remote slip site with -.B sliplogin +.Nm sliplogin as the shell for that entry. E.g., -.RS +.Bd -literal Sfoo:ikhuy6:2010:1:slip line to foo:/tmp:/etc/sliplogin -.RE +.Ed +.Pp (Our convention is to name the account used by remote host -.I hostname +.Ar hostname as -.IR Shostname .) +.Em Shostname . ) Then an entry is added to -.B slip.hosts +.Pa slip.hosts that looks like: -.RS +.Pp +.Bd -literal -offset indent -compact Sfoo `hostname` foo netmask -.RE +.Ed +.Pp where -.I `hostname` +.Em `hostname` will be evaluated by -.B sh +.Xr sh to the local host name and -.I netmask +.Em netmask is the local host IP netmask. -.PP +.Pp Note that -.B sliplogin +.Nm sliplogin must be setuid to root and, while not a security hole, moral defectives can use it to place terminal lines in an unusable state and/or deny access to legitimate users of a remote slip line. To prevent this, a site can create a group, say -.IR slip , +.Em slip , that only the slip login accounts are put in then make sure that -.B /etc/sliplogin +.Pa /etc/sliplogin is in group -.I slip +.Em slip and mode 4550 (setuid root, only group -.I slip +.Em slip can execute binary). -.SH "DIAGNOSTICS" -.B sliplogin +.Sh DIAGNOSTICS +.Nm Sliplogin logs various information to the system log daemon, -.BR syslogd (8), +.Xr syslogd 8 , with a facility code of -.BR daemon . +.Em daemon . The messages are listed here, grouped by severity level. -.SS Err Severity -.TP -.BI "ioctl (TCGETS): " reason +.Sy Error Severity +.Bl -tag -width Ds +.It Sy ioctl (TCGETS): Em reason A -.SB TCGETS -.B ioctl +.Dv TCGETS +.Fn ioctl to get the line parameters failed. -.TP -.BI "ioctl (TCSETS): " reason +.It Sy ioctl (TCSETS): Em reason A -.SB TCSETS -.B ioctl +.Dv TCSETS +.Fn ioctl to set the line parameters failed. -.TP -.BI "/etc/slip.hosts: " reason +.It Sy /etc/slip.hosts: Em reason The -.B /etc/slip.hosts +.Pa /etc/slip.hosts file could not be opened. -.TP -.BI "access denied for " user +.It Sy access denied for Em user No entry for -.I user +.Em user was found in -.BR /etc/slip.hosts . -.SS Notice Severity -.TP -.BI "attaching slip unit " unit " for " loginname -SLIP unit -.I unit +.Pa /etc/slip.hosts . +.El +.Pp +.Sy Notice Severity +.Bl -tag -width Ds +.It Sy "attaching slip unit" Em unit Sy for Ar loginname +.Tn SLIP +unit +.Em unit was successfully attached. -.SH "SEE ALSO" -.BR slattach (8), -.BR syslogd (8) +.El +.Sh SEE ALSO +.Xr slattach 8 , +.Xr syslogd 8 +.Sh HISTORY +The +.Nm +command +.Bt diff --git a/usr/src/usr.sbin/syslogd/syslogd.8 b/usr/src/usr.sbin/syslogd/syslogd.8 index 36c9bf1c46..55db7918e1 100644 --- a/usr/src/usr.sbin/syslogd/syslogd.8 +++ b/usr/src/usr.sbin/syslogd/syslogd.8 @@ -1,70 +1,96 @@ -.\" Copyright (c) 1983, 1986 The Regents of the University of California. +.\" Copyright (c) 1983, 1986, 1991 The Regents of the University of California. .\" All rights reserved. .\" .\" %sccs.include.redist.man% .\" -.\" @(#)syslogd.8 6.9 (Berkeley) %G% +.\" @(#)syslogd.8 6.10 (Berkeley) %G% .\" -.TH SYSLOGD 8 "" -.UC 5 -.SH NAME -syslogd \- log systems messages -.SH SYNOPSIS -.nf -.ft B -syslogd [\-f config_file] [\-m mark_interval] [\-p log_socket] -.fi -.ft R -.SH DESCRIPTION -.I Syslogd +.Dd +.Dt SYSLOGD 8 +.Os BSD 4.2 +.Sh NAME +.Nm syslogd +.Nd log systems messages +.Sh SYNOPSIS +.Nm syslogd +.Op Fl f Ar config_file +.Op Fl m Ar mark_interval +.Op Fl p Ar log_socket +.Sh DESCRIPTION +.Nm Syslogd reads and logs messages to the system console, log files, other machines and/or users as specified by its configuration file. The options are as follows: -.TP -.I -f +.Bl -tag -width Ds +.It Fl f Specify the pathname of an alternate configuration file; -the default is ``/etc/syslog.conf''. -.TP -.I \-m +the default is +.Pa /etc/syslog.conf . +.It Fl m Select the number of minutes between ``mark'' messages; the default is 20 minutes. -.TP -.I \-p +.It Fl p Specify the pathname of an alternate log socket; -the default is ``/dev/log''. -.PP -.I Syslogd +the default is +.Pa /dev/log . +.El +.Pp +.Nm Syslogd reads its configuration file when it starts up and whenever it receives a hangup signal. For information on the format of the configuration file, see -.IR syslog.conf (5). -.PP -.I Syslogd -reads messages from the UNIX domain socket ``/dev/log'', -from an Internet domain socket specified in ``/etc/services'', -and from the special device ``/dev/klog'' (to read kernel messages). -.PP -.I Syslogd -creates the file ``/var/run/syslog.pid'', and stores its process +.Xr syslog.conf 5 . +.Pp +.Nm Syslogd +reads messages from the +.Tn UNIX +domain socket +.Pa /dev/log , +from an Internet domain socket specified in +.Pa /etc/services , +and from the special device +.Pa /dev/klog +(to read kernel messages). +.Pp +.Nm Syslogd +creates the file +.Pa /var/run/syslog.pid , +and stores its process id there. This can be used to kill or reconfigure -.IR syslogd . -.PP +.Nm syslogd . +.Pp The message sent to -.I syslogd +.Nm syslogd should consist of a single line. The message can contain a priority code, which should be a preceding -decimal number in angle braces, for example, ``<5>''. +decimal number in angle braces, for example, +.Sq Aq 5. This priority code should map into the priorities defined in the -include file ``''. -.SH FILES -.ta \w'/etc/syslog.conf 'u -.nf -/etc/syslog.conf The configuration file. -/var/run/syslog.pid The process id of current \fIsyslogd\fP. -/dev/log Name of the UNIX domain datagram log socket. -/dev/klog The kernel log device. -.fi -.SH SEE ALSO -logger(1), syslog(3), services(5), syslog.conf(5) +include file +.Aq Pa sys/syslog.h . +.Sh FILES +.Bl -tag -width /var/run/syslog.pid -compact +.It Pa /etc/syslog.conf +The configuration file. +.It Pa /var/run/syslog.pid +The process id of current +.Nm syslogd . +.It Pa /dev/log +Name of the +.Tn UNIX +domain datagram log socket. +.It Pa /dev/klog +The kernel log device. +.El +.Sh SEE ALSO +.Xr logger 1 , +.Xr syslog 3 , +.Xr services 5 , +.Xr syslog.conf 5 +.Sh HISTORY +The +.Nm +command appeared in +.Bx 4.3 . diff --git a/usr/src/usr.sbin/timed/timedc/timedc.8 b/usr/src/usr.sbin/timed/timedc/timedc.8 index ebde6f6c2d..6f6d9da97a 100644 --- a/usr/src/usr.sbin/timed/timedc/timedc.8 +++ b/usr/src/usr.sbin/timed/timedc/timedc.8 @@ -1,84 +1,110 @@ -.\" Copyright (c) 1980 Regents of the University of California. +.\" Copyright (c) 1980, 1991 Regents of the University of California. .\" All rights reserved. .\" .\" %sccs.include.redist.man% .\" -.\" @(#)timedc.8 6.5 (Berkeley) %G% +.\" @(#)timedc.8 6.6 (Berkeley) %G% .\" -.TH TIMEDC 8 "" -.UC 6 +.Dd +.Dt TIMEDC 8 +.Os BSD 4.3 .ad -.SH NAME -timedc \- timed control program -.SH SYNOPSIS -.B timedc -[ command [ argument ... ] ] -.SH DESCRIPTION -.I Timedc -is used to control the operation of the \fItimed\fP program. +.Sh NAME +.Nm timedc +.Nd timed control program +.Sh SYNOPSIS +.Nm timedc +.Oo Ar command\ \& +.Op Ar argument ... +.Oc +.Sh DESCRIPTION +.Nm Timedc +is used to control the operation of the +.Xr timed 8 +program. It may be used to: -.IP \(bu -measure the differences between machines' clocks, -.IP \(bu -find the location where the master time server is running, -.IP \(bu -enable or disable tracing of messages received by \fItimed\fP, and -.IP \(bu -perform various debugging actions. -.PP +.Bl -bullet +.It +Measure the differences between machines' clocks, +.It +Find the location where the master time server is running, +.It +Enable or disable tracing of messages received by +.Xr timed , +and +.It +Perform various debugging actions. +.El +.Pp Without any arguments, -.I timedc +.Nm timedc will prompt for commands from the standard input. If arguments are supplied, -.IR timedc +.Nm timedc interprets the first argument as a command and the remaining arguments as parameters to the command. The standard input may be redirected causing -.I timedc +.Nm timedc to read commands from a file. Commands may be abbreviated; recognized commands are: -.TP -? [ command ... ] -.TP -help [ command ... ] -.br +.Pp +.Bl -tag -width Ds -compact +.It Ic \&? Op Ar command ... +.It Ic help Op Ar command ... Print a short description of each command specified in the argument list, or, if no arguments are given, a list of the recognized commands. -.TP -clockdiff host ... -.br +.Pp +.It Ic clockdiff Ar host ... Compute the differences between the clock of the host machine and the clocks of the machines given as arguments. -.TP -trace { on | off } -.br -Enable or disable the tracing of incoming messages to \fItimed\fP -in the file /var/log/timed.log. -.TP -quit -.br +.Pp +.It Xo +.Ic trace +.Li \&{ Ar on Li \&| +.Ar off \&} +.Xc +Enable or disable the tracing of incoming messages to +.Xr timed +in the file +.Pa /var/log/timed.log. +.Pp +.It Ic quit Exit from timedc. -.PP +.El +.Pp Other commands may be included for use in testing and debugging -.IR timed ; +.Xr timed ; the help command and the program source may be consulted for details. -.SH FILES -.nf -.ta \w'/var/log/masterlog 'u -/var/log/timed.log tracing file for timed -/var/log/timed.masterlog log file for master timed -.fi -.SH "SEE ALSO" -date(1), adjtime(2), icmp(4), timed(8), -.br -\fITSP: The Time Synchronization Protocol for UNIX 4.3BSD\fP, -R. Gusella and S. Zatti -.SH DIAGNOSTICS -.nf -.ta \w'?Ambiguous command 'u -?Ambiguous command abbreviation matches more than one command -?Invalid command no match found -?Privileged command command can be executed by root only -.fi +.Sh FILES +.Bl -tag -width /var/log/timed.masterlog -compact +.It Pa /var/log/timed.log +tracing file for timed +.It Pa /var/log/timed.masterlog +log file for master timed +.El +.Sh SEE ALSO +.Xr date 1 , +.Xr adjtime 2 , +.Xr icmp 4 , +.Xr timed 8 , +.Rs +.%T "TSP: The Time Synchronization Protocol for UNIX 4.3BSD" +.%A R. Gusella +.%A S. Zatti +.Re +.Sh DIAGNOSTICS +.Bl -tag -width Ds -compact +.It ?Ambiguous command +abbreviation matches more than one command +.It ?Invalid command +no match found +.It ?Privileged command +command can be executed by root only +.El +.Sh HISTORY +The +.Nm +command appeared in +.Bx 4.3 . diff --git a/usr/src/usr.sbin/traceroute/traceroute.8 b/usr/src/usr.sbin/traceroute/traceroute.8 index 9389cb42ea..3c7d880341 100644 --- a/usr/src/usr.sbin/traceroute/traceroute.8 +++ b/usr/src/usr.sbin/traceroute/traceroute.8 @@ -1,4 +1,4 @@ -.\" Copyright (c) 1990 The Regents of the University of California. +.\" Copyright (c) 1990, 1991 The Regents of the University of California. .\" All rights reserved. .\" .\" This code is derived from software contributed to Berkeley by @@ -6,181 +6,206 @@ .\" .\" %sccs.include.redist.man% .\" -.\" @(#)traceroute.8 5.3 (Berkeley) %G% +.\" @(#)traceroute.8 5.4 (Berkeley) %G% .\" -.TH TRACEROUTE 8 "" -.UC 6 -.SH NAME -traceroute \- print the route packets take to network host -.SH SYNOPSIS -.B traceroute -[ -.B \-m -max_ttl -] [ -.B \-n -] [ -.B \-p -port -] [ -.B \-q -nqueries -] [ -.B \-r -] [ -.B \-s -src_addr -] [ -.B \-t -tos -] [ -.B \-w -] [ -.B \-w -waittime -] -.I host -[ -.I packetsize -] -.SH DESCRIPTION +.Dd +.Dt TRACEROUTE 8 +.Os BSD 4.3 +.Sh NAME +.Nm traceroute +.Nd print the route packets take to network host +.Sh SYNOPSIS +.Nm traceroute +.Op Fl m Ar max_ttl +.Op Fl n +.Op Fl p Ar port +.Op Fl q Ar nqueries +.Op Fl r +.Bk -words +.Op Fl s Ar src_addr +.Ek +.Op Fl t Ar tos +.Op Fl w Ar waittime +.Ar host +.Op Ar packetsize +.Sh DESCRIPTION The Internet is a large and complex aggregation of network hardware, connected together by gateways. Tracking the route one's packets follow (or finding the miscreant gateway that's discarding your packets) can be difficult. -.I Traceroute +.Nm Traceroute utilizes the IP protocol `time to live' field and attempts to elicit an -ICMP TIME_EXCEEDED response from each gateway along the path to some +.Tn ICMP +.Dv TIME_EXCEEDED +response from each gateway along the path to some host. - +.Pp The only mandatory parameter is the destination host name or IP number. The default probe datagram length is 38 bytes, but this may be increased by specifying a packet size (in bytes) after the destination host name. - +.Pp Other options are: -.TP -.B \-m +.Bl -tag -width Ds +.It Fl m Ar max_ttl Set the max time-to-live (max number of hops) used in outgoing probe -packets. The default is 30 hops (the same default used for TCP +packets. The default is 30 hops (the same default used for +.Tn TCP connections). -.TP -.B \-n +.It Fl n Print hop addresses numerically rather than symbolically and numerically (saves a nameserver address-to-name lookup for each gateway found on the path). -.TP -.B \-p -Set the base UDP port number used in probes (default is 33434). -Traceroute hopes that nothing is listening on UDP ports -.I base +.It Fl p Ar port +Set the base +.Tn UDP +.Ar port +number used in probes (default is 33434). +.Nm Traceroute +hopes that nothing is listening on +.Tn UDP +ports +.Em base to -.I base+nhops-1 -at the destination host (so an ICMP PORT_UNREACHABLE message will +.Em base+nhops-1 +at the destination host (so an +.Tn ICMP +.Dv PORT_UNREACHABLE +message will be returned to terminate the route tracing). If something is listening on a port in the default range, this option can be used to pick an unused port range. -.TP -.B \-r +.It Fl q Ar nqueries +Set the number of probes per ``ttl'' to +.Ar nqueries +(default is three probes). +.It Fl r Bypass the normal routing tables and send directly to a host on an attached network. If the host is not on a directly-attached network, an error is returned. This option can be used to ping a local host through an interface that has no route through it (e.g., after the interface was dropped by -.IR routed (8C)). -.TP -.B \-s -Use the following IP address (which must be given as an IP number, not +.Xr routed 8 ) . +.It Fl s Ar src_addr +Use the following IP address +(which must be given as an IP number, not a hostname) as the source address in outgoing probe packets. On hosts with more than one IP address, this option can be used to force the source address to be something other than the IP address of the interface the probe packet is sent on. If the IP address is not one of this machine's interface addresses, an error is returned and nothing is sent. -.TP -.B \-t +.It Fl t Ar tos Set the -.I type-of-service -in probe packets to the following value (default zero). The value must be +.Em type-of-service +in probe packets to the following value (default zero). The value must be a decimal integer in the range 0 to 255. This option can be used to see if different types-of-service result in different paths. (If you -are not running 4.4bsd, this may be academic since the normal network -services like telnet and ftp don't let you control the TOS). -Not all values of TOS are legal or +are not running a +.Bx 4.3 tahoe +or later system, this may be academic since the normal network +services like telnet and ftp don't let you control the +.Dv TOS ) . +Not all values of +.Dv TOS +are legal or meaningful \- see the IP spec for definitions. Useful values are -probably `-t 16' (low delay) and `-t 8' (high throughput). -.TP -.B \-v -Verbose output. Received ICMP packets other than TIME_EXCEEDED and -UNREACHABLEs are listed. -.TP -.B \-w +probably +.Ql \-t 16 +(low delay) and +.Ql \-t 8 +(high throughput). +.It Fl v +Verbose output. Received +.Tn ICMP +packets other than +.Dv TIME_EXCEEDED +and +.Dv UNREACHABLE Ns s +are listed. +.It Fl w Set the time (in seconds) to wait for a response to a probe (default 3 sec.). -.PP +.El +.Pp This program attempts to trace the route an IP packet would follow to some -internet host by launching UDP probe +internet host by launching +.Tn UDP +probe packets with a small ttl (time to live) then listening for an -ICMP "time exceeded" reply from a gateway. We start our probes -with a ttl of one and increase by one until we get an ICMP "port -unreachable" (which means we got to "host") or hit a max (which -defaults to 30 hops & can be changed with the \-m flag). Three -probes (change with \-q flag) are sent at each ttl setting and a +.Tn ICMP +"time exceeded" reply from a gateway. We start our probes +with a ttl of one and increase by one until we get an +.Tn ICMP +"port unreachable" +(which means we got to "host") or hit a max (which +defaults to 30 hops & can be changed with the +.Fl m +flag). Three +probes (changed with +.Fl q +flag) are sent at each ttl setting and a line is printed showing the ttl, address of the gateway and round trip time of each probe. If the probe answers come from different gateways, the address of each responding system will be printed. If there is no response within a 3 sec. timeout -interval (changed with the \-w flag), a "*" is printed for that +interval (changed with the +.Fl w +flag), a "*" is printed for that probe. -.PP +.Pp We don't want the destination -host to process the UDP probe packets so the destination port is set to an +host to process the +.Tn UDP +probe packets so the destination port is set to an unlikely value (if some clod on the destination is using that -value, it can be changed with the \-p flag). -.PP +value, it can be changed with the +.Fl p +flag). +.Pp A sample use and output might be: - -.RS -.nf +.Bd -literal [yak 71]% traceroute nis.nsf.net. traceroute to nis.nsf.net (35.1.1.48), 30 hops max, 56 byte packet - 1 helios.ee.lbl.gov (128.3.112.1) 19 ms 19 ms 0 ms - 2 lilac-dmc.Berkeley.EDU (128.32.216.1) 39 ms 39 ms 19 ms - 3 lilac-dmc.Berkeley.EDU (128.32.216.1) 39 ms 39 ms 19 ms - 4 ccngw-ner-cc.Berkeley.EDU (128.32.136.23) 39 ms 40 ms 39 ms - 5 ccn-nerif22.Berkeley.EDU (128.32.168.22) 39 ms 39 ms 39 ms - 6 128.32.197.4 (128.32.197.4) 40 ms 59 ms 59 ms - 7 131.119.2.5 (131.119.2.5) 59 ms 59 ms 59 ms - 8 129.140.70.13 (129.140.70.13) 99 ms 99 ms 80 ms - 9 129.140.71.6 (129.140.71.6) 139 ms 239 ms 319 ms +1 helios.ee.lbl.gov (128.3.112.1) 19 ms 19 ms 0 ms +2 lilac-dmc.Berkeley.EDU (128.32.216.1) 39 ms 39 ms 19 ms +3 lilac-dmc.Berkeley.EDU (128.32.216.1) 39 ms 39 ms 19 ms +4 ccngw-ner-cc.Berkeley.EDU (128.32.136.23) 39 ms 40 ms 39 ms +5 ccn-nerif22.Berkeley.EDU (128.32.168.22) 39 ms 39 ms 39 ms +6 128.32.197.4 (128.32.197.4) 40 ms 59 ms 59 ms +7 131.119.2.5 (131.119.2.5) 59 ms 59 ms 59 ms +8 129.140.70.13 (129.140.70.13) 99 ms 99 ms 80 ms +9 129.140.71.6 (129.140.71.6) 139 ms 239 ms 319 ms 10 129.140.81.7 (129.140.81.7) 220 ms 199 ms 199 ms 11 nic.merit.edu (35.1.1.48) 239 ms 239 ms 239 ms -.fi -.RE +.Ed Note that lines 2 & 3 are the same. This is due to a buggy kernel on the 2nd hop system \- lbl-csam.arpa \- that forwards packets with a zero ttl (a bug in the distributed version -of 4.3BSD). Note that you have to guess what path -the packets are taking cross-country since the NSFNet (129.140) -doesn't supply address-to-name translations for its NSSes. -.PP +of 4.3 +.Tn BSD ) . +Note that you have to guess what path +the packets are taking cross-country since the +.Tn NSFNet +(129.140) +doesn't supply address-to-name translations for its +.Tn NSS Ns es . +.Pp A more interesting example is: - -.RS -.nf +.Bd -literal [yak 72]% traceroute allspice.lcs.mit.edu. traceroute to allspice.lcs.mit.edu (18.26.0.115), 30 hops max - 1 helios.ee.lbl.gov (128.3.112.1) 0 ms 0 ms 0 ms - 2 lilac-dmc.Berkeley.EDU (128.32.216.1) 19 ms 19 ms 19 ms - 3 lilac-dmc.Berkeley.EDU (128.32.216.1) 39 ms 19 ms 19 ms - 4 ccngw-ner-cc.Berkeley.EDU (128.32.136.23) 19 ms 39 ms 39 ms - 5 ccn-nerif22.Berkeley.EDU (128.32.168.22) 20 ms 39 ms 39 ms - 6 128.32.197.4 (128.32.197.4) 59 ms 119 ms 39 ms - 7 131.119.2.5 (131.119.2.5) 59 ms 59 ms 39 ms - 8 129.140.70.13 (129.140.70.13) 80 ms 79 ms 99 ms - 9 129.140.71.6 (129.140.71.6) 139 ms 139 ms 159 ms +1 helios.ee.lbl.gov (128.3.112.1) 0 ms 0 ms 0 ms +2 lilac-dmc.Berkeley.EDU (128.32.216.1) 19 ms 19 ms 19 ms +3 lilac-dmc.Berkeley.EDU (128.32.216.1) 39 ms 19 ms 19 ms +4 ccngw-ner-cc.Berkeley.EDU (128.32.136.23) 19 ms 39 ms 39 ms +5 ccn-nerif22.Berkeley.EDU (128.32.168.22) 20 ms 39 ms 39 ms +6 128.32.197.4 (128.32.197.4) 59 ms 119 ms 39 ms +7 131.119.2.5 (131.119.2.5) 59 ms 59 ms 39 ms +8 129.140.70.13 (129.140.70.13) 80 ms 79 ms 99 ms +9 129.140.71.6 (129.140.71.6) 139 ms 139 ms 159 ms 10 129.140.81.7 (129.140.81.7) 199 ms 180 ms 300 ms 11 129.140.72.17 (129.140.72.17) 300 ms 239 ms 239 ms 12 * * * @@ -190,78 +215,96 @@ traceroute to allspice.lcs.mit.edu (18.26.0.115), 30 hops max 16 * * * 17 * * * 18 ALLSPICE.LCS.MIT.EDU (18.26.0.115) 339 ms 279 ms 279 ms -.fi -.RE +.Ed Note that the gateways 12, 14, 15, 16 & 17 hops away -either don't send ICMP "time exceeded" messages or send them +either don't send +.Tn ICMP +"time exceeded" messages or send them with a ttl too small to reach us. 14 \- 17 are running the -MIT C Gateway code that doesn't send "time exceeded"s. God +.Tn MIT +C Gateway code that doesn't send "time exceeded"s. God only knows what's going on with 12. -.PP +.Pp The silent gateway 12 in the above may be the result of a bug in -the 4.[23]BSD network code (and its derivatives): 4.x (x <= 3) +the 4.[23] +.Tn BSD +network code (and its derivatives): 4.x (x <= 3) sends an unreachable message using whatever ttl remains in the original datagram. Since, for gateways, the remaining ttl is -zero, the ICMP "time exceeded" is guaranteed to not make it back +zero, the +.Tn ICMP +"time exceeded" is guaranteed to not make it back to us. The behavior of this bug is slightly more interesting when it appears on the destination system: - -.RS -.nf - 1 helios.ee.lbl.gov (128.3.112.1) 0 ms 0 ms 0 ms - 2 lilac-dmc.Berkeley.EDU (128.32.216.1) 39 ms 19 ms 39 ms - 3 lilac-dmc.Berkeley.EDU (128.32.216.1) 19 ms 39 ms 19 ms - 4 ccngw-ner-cc.Berkeley.EDU (128.32.136.23) 39 ms 40 ms 19 ms - 5 ccn-nerif35.Berkeley.EDU (128.32.168.35) 39 ms 39 ms 39 ms - 6 csgw.Berkeley.EDU (128.32.133.254) 39 ms 59 ms 39 ms - 7 * * * - 8 * * * - 9 * * * +.Bd -literal +1 helios.ee.lbl.gov (128.3.112.1) 0 ms 0 ms 0 ms +2 lilac-dmc.Berkeley.EDU (128.32.216.1) 39 ms 19 ms 39 ms +3 lilac-dmc.Berkeley.EDU (128.32.216.1) 19 ms 39 ms 19 ms +4 ccngw-ner-cc.Berkeley.EDU (128.32.136.23) 39 ms 40 ms 19 ms +5 ccn-nerif35.Berkeley.EDU (128.32.168.35) 39 ms 39 ms 39 ms +6 csgw.Berkeley.EDU (128.32.133.254) 39 ms 59 ms 39 ms +7 * * * +8 * * * +9 * * * 10 * * * 11 * * * 12 * * * 13 rip.Berkeley.EDU (128.32.131.22) 59 ms ! 39 ms ! 39 ms ! -.fi -.RE +.Ed Notice that there are 12 "gateways" (13 is the final destination) and exactly the last half of them are "missing". What's really happening is that rip (a Sun-3 running Sun OS3.5) is using the ttl from our arriving datagram as the ttl in its -ICMP reply. So, the reply will time out on the return path -(with no notice sent to anyone since ICMP's aren't sent for -ICMP's) until we probe with a ttl that's at least twice the path +.Tn ICMP +reply. So, the reply will time out on the return path +(with no notice sent to anyone since +.Tn ICMP's +aren't sent for +.Tn ICMP's ) +until we probe with a ttl that's at least twice the path length. I.e., rip is really only 7 hops away. A reply that returns with a ttl of 1 is a clue this problem exists. -Traceroute prints a "!" after the time if the ttl is <= 1. -Since vendors ship a lot of obsolete (DEC's Ultrix, Sun 3.x) or -non-standard (HPUX) software, expect to see this problem +.Nm Traceroute +prints a "!" after the time if the ttl is <= 1. +Since vendors ship a lot of obsolete +.Pf ( Tn DEC Ns \'s +Ultrix, Sun 3.x) or +non-standard +.Pq Tn HPUX +software, expect to see this problem frequently and/or take care picking the target host of your probes. - Other possible annotations after the time are -.BR !H , -.BR !N , -.B !P +.Sy !H , +.Sy !N , +.Sy !P (got a host, network or protocol unreachable, respectively), -.B !S +.Sy !S or -.B !F +.Sy !F (source route failed or fragmentation needed \- neither of these should ever occur and the associated gateway is busted if you see one). If -almost all the probes result in some kind of unreachable, traceroute +almost all the probes result in some kind of unreachable, +.Nm traceroute will give up and exit. -.PP +.Pp This program is intended for use in network testing, measurement and management. It should be used primarily for manual fault isolation. Because of the load it could impose on the network, it is unwise to use -.I traceroute +.Nm traceroute during normal operations or from automated scripts. -.SH AUTHOR +.Sh AUTHOR Implemented by Van Jacobson from a suggestion by Steve Deering. Debugged by a cast of thousands with particularly cogent suggestions or fixes from C. Philip Wood, Tim Seaver and Ken Adelman. -.SH SEE ALSO -netstat(1), ping(8) +.Sh SEE ALSO +.Xr netstat 1 , +.Xr ping 8 +.Sh HISTORY +The +.Nm +command +.Bt diff --git a/usr/src/usr.sbin/trpt/trpt.8 b/usr/src/usr.sbin/trpt/trpt.8 index f4b4670a0f..ba61fe7d85 100644 --- a/usr/src/usr.sbin/trpt/trpt.8 +++ b/usr/src/usr.sbin/trpt/trpt.8 @@ -1,113 +1,126 @@ -.\" Copyright (c) 1983 The Regents of the University of California. +.\" Copyright (c) 1983, 1991 The Regents of the University of California. .\" All rights reserved. .\" .\" %sccs.include.redist.man% .\" -.\" @(#)trpt.8 6.4 (Berkeley) %G% +.\" @(#)trpt.8 6.5 (Berkeley) %G% .\" -.TH TRPT 8 "" -.UC 5 -.SH NAME -trpt \- transliterate protocol trace -.SH SYNOPSIS -.B trpt -[ -.B \-a -] [ -.B \-s -] [ -.B \-t -] [ -.B \-f -] [ -.B \-j -] [ -.B \-p -hex-address ] -[ system [ core ] ] -.SH DESCRIPTION -.I Trpt -interrogates the buffer of TCP trace records created -when a socket is marked for \*(lqdebugging\*(rq (see -.IR setsockopt (2)), +.Dd +.Dt TRPT 8 +.Os BSD 4.2 +.Sh NAME +.Nm trpt +.Nd transliterate protocol trace +.Sh SYNOPSIS +.Nm trpt +.Op Fl a +.Op Fl f +.Op Fl j +.Op Fl p Ar hex-address +.Op Fl s +.Op Fl t +.Oo +.Ar system Op Ar core +.Oc +.Sh DESCRIPTION +.Nm Trpt +interrogates the buffer of +.Tn TCP +trace records created +when a socket is marked for +.Dq debugging +(see +.Xr setsockopt 2 ) , and prints a readable description of these records. When no options are supplied, -.I trpt +.Nm trpt prints all the trace records found in the system -grouped according to TCP connection protocol control -block (PCB). The following options may be used to +grouped according to +.Tn TCP +connection protocol control +block +.Pq Tn PCB . +The following options may be used to alter this behavior. -.TP -.B \-a -in addition to the normal output, +.Bl -tag -width Ds +.It Fl a +In addition to the normal output, print the values of the source and destination addresses for each packet recorded. -.TP -.B \-s -in addition to the normal output, +.It Fl f +Follow the trace as it occurs, waiting a short time for additional records +each time the end of the log is reached. +.It Fl j +Just give a list of the protocol control block +addresses for which there are trace records. +.It Fl p +Show only trace records associated with the protocol +control block at the given address +.Ar hex-address . +.It Fl s +In addition to the normal output, print a detailed description of the packet sequencing information. -.TP -.B \-t +.It Fl t in addition to the normal output, print the values for all timers at each point in the trace. -.TP -.B \-f -follow the trace as it occurs, waiting a short time for additional records -each time the end of the log is reached. -.TP -.B \-j -just give a list of the protocol control block -addresses for which there are trace records. -.TP -.B \-p -show only trace records associated with the protocol -control block, the address of which follows. -.PP +.El +.Pp The recommended use of -.I trpt +.Nm trpt is as follows. Isolate the problem and enable debugging on the socket(s) involved in the connection. Find the address of the protocol control blocks associated with the sockets using the -.B \-A +.Fl A option to -.IR netstat (1). +.Xr netstat 1 . Then run -.I trpt +.Nm trpt with the -.B \-p +.Fl p option, supplying the associated protocol control block addresses. The -.B \-f +.Fl f option can be used to follow the trace log once the trace is located. If there are many sockets using the debugging option, the -.B \-j +.Fl j option may be useful in checking to see if any trace records are present for the socket in question. The -.PP +.Pp If debugging is being performed on a system or core file other than the default, the last two arguments may be used to supplant the defaults. -.SH FILES -/vmunix -.br -/dev/kmem -.SH "SEE ALSO" -netstat(1), setsockopt(2), trsp(8) -.SH DIAGNOSTICS -``no namelist'' when the system image doesn't +.Sh FILES +.Bl -tag -width /dev/kmem -compact +.It Pa /vmunix +.It Pa /dev/kmem +.El +.Sh SEE ALSO +.Xr netstat 1 , +.Xr setsockopt 2 , +.Xr trsp 8 +.Sh DIAGNOSTICS +.Bl -tag -width Ds +.It Sy no namelist +When the system image doesn't contain the proper symbols to find the trace buffer; others which should be self explanatory. -.SH BUGS +.El +.Sh BUGS Should also print the data for each input or output, but this is not saved in the race record. -.PP +.Pp The output format is inscrutable and should be described here. +.Sh HISTORY +The +.Nm +command appeared in +.Bx 4.2 . diff --git a/usr/src/usr.sbin/trsp/trsp.8 b/usr/src/usr.sbin/trsp/trsp.8 index d60bc578de..6504b7f628 100644 --- a/usr/src/usr.sbin/trsp/trsp.8 +++ b/usr/src/usr.sbin/trsp/trsp.8 @@ -1,105 +1,118 @@ This manual page documents a tool used for debugging failures in the Xerox NS Sequenced packet protocol layer. It is adapted from the Internet equivalent trpt(8c). -.\" Copyright (c) 1985 The Regents of the University of California. +.\" Copyright (c) 1985, 1991 The Regents of the University of California. .\" All rights reserved. .\" .\" %sccs.include.redist.man% .\" -.\" @(#)trsp.8 6.3 (Berkeley) %G% +.\" @(#)trsp.8 6.4 (Berkeley) %G% .\" -.TH TRSP 8 "" -.UC 5 -.SH NAME -trsp \- transliterate sequenced packet protocol trace -.SH SYNOPSIS -.B trsp -[ -.B \-a -] [ -.B \-s -] [ -.B \-t -] [ -.B \-j -] [ -.B \-p -hex-address ] -[ system [ core ] ] -.SH DESCRIPTION -.I Trpt -interrogates the buffer of SPP trace records created -when a socket is marked for \*(lqdebugging\*(rq (see -.IR setsockopt (2)), +.Dd +.Dt TRSP 8 +.Os BSD 4.2 +.Sh NAME +.Nm trsp +.Nd transliterate sequenced packet protocol trace +.Sh SYNOPSIS +.Nm trsp +.Op Fl a +.Op Fl s +.Op Fl t +.Op Fl j +.Op Fl p Ar hex-address +.Oo +.Ar system Op Ar core +.Oc +.Sh DESCRIPTION +.Xr Trpt +interrogates the buffer of +.Tn SPP +trace records created +when a socket is marked for +.Dq debugging +(see +.Xr setsockopt 2 ) , and prints a readable description of these records. When no options are supplied, -.I trsp +.Nm trsp prints all the trace records found in the system -grouped according to SPP connection protocol control -block (PCB). The following options may be used to +grouped according to +.Tn SPP +connection protocol control +block +.Pq Tn PCB . +The following options may be used to alter this behavior. -.TP -.B \-s +.Bl -tag -width Ds +.It Fl a +In addition to the normal output, +print the values of the source and destination +addresses for each packet recorded. +.It Fl j +Just give a list of the protocol control block +addresses for which there are trace records. +.It Fl p +Show only trace records associated with the protocol +control block at the given address, +.Ar hex-address . +.It Fl s in addition to the normal output, print a detailed description of the packet -sequencing information, -.TP -.B \-t +sequencing information. +.It Fl t in addition to the normal output, print the values for all timers at each point in the trace, -.TP -.B \-j -just give a list of the protocol control block -addresses for which there are trace records, -.TP -.B \-p -show only trace records associated with the protocol -control block who's address follows, -.TP -.B \-a -in addition to the normal output, -print the values of the source and destination -addresses for each packet recorded. -.PP +.El +.Pp The recommended use of -.I trsp +.Nm trsp is as follows. Isolate the problem and enable debugging on the socket(s) involved in the connection. Find the address of the protocol control blocks associated with the sockets using the -.B \-A +.Fl A option to -.IR netstat (1). +.Xr netstat 1 . Then run -.I trsp +.Nm trsp with the -.B \-p +.Fl p option, supplying the associated protocol control block addresses. If there are many sockets using the debugging option, the -.B \-j +.Fl j option may be useful in checking to see if any trace records are present for the socket in question. -.PP +.Pp If debugging is being performed on a system or core file other than the default, the last two arguments may be used to supplant the defaults. -.SH FILES -/vmunix -.br -/dev/kmem -.SH "SEE ALSO" -netstat(1), setsockopt(2) -.SH DIAGNOSTICS -``no namelist'' when the system image doesn't +.Sh FILES +.Bl -tag -width /dev/kmem -compact +.It Pa /vmunix +.It Pa /dev/kmem +.El +.Sh SEE ALSO +.Xr netstat 1 , +.Xr setsockopt 2 +.Sh DIAGNOSTICS +.Bl -tag -width Ds +.It Sy no namelist +When the system image doesn't contain the proper symbols to find the trace buffer; others which should be self explanatory. -.SH BUGS +.Sh BUGS Should also print the data for each input or output, but this is not saved in the race record. -.PP +.Pp The output format is inscrutable and should be described here. +.Sh HISTORY +The +.Nm +command appeared in +.Bx 4.3 . diff --git a/usr/src/usr.sbin/update/update.8 b/usr/src/usr.sbin/update/update.8 index a569219c58..e6dc700b48 100644 --- a/usr/src/usr.sbin/update/update.8 +++ b/usr/src/usr.sbin/update/update.8 @@ -1,39 +1,46 @@ -.\" @(#)update.8 6.2 (Berkeley) %G% +.\" @(#)update.8 6.2 (Berkeley) 6/24/90 .\" -.TH UPDATE 8 "" -.AT 3 -.SH NAME -update \- periodically update the super block -.SH SYNOPSIS -.B update -.SH DESCRIPTION -.I Update -is a program that executes -the -.IR sync (2) -primitive every 30 seconds. -This insures that the file system -is fairly up to date in case of a crash. -This command should not be executed directly, -but should be executed out of the -initialization shell command file. -.SH "SEE ALSO" -sync(2), sync(8), init(8), rc(8) -.SH BUGS -With -.I update -running, -if the CPU is -halted just as -the -.I sync -is executed, -a file system can be damaged. -This is partially due to DEC hardware that -writes zeros when NPR requests fail. -A fix would be to have -.IR sync (8) -temporarily increment the system time by at -least 30 seconds to trigger the execution of -.I update. -This would give 30 seconds grace to halt the CPU. +.\" %sccs.include.redist.man% +.\" +.\" @(#)update.8 6.3 (Berkeley) %G% +.\" +.Dd +.Dt UPDATE 8 +.Os ATT 7th +.Sh NAME +.Nm update +.Nd flush internal filesystem caches to disk frequently +.Sh SYNOPSIS +.Nm update +.Sh DESCRIPTION +The +.Nm update +command helps protect the integrity of disk volumes +by flushing +voliatile cached filesystem data +to disk at thirty second intervals. +.Nm Update +uses the +.Xr sync 2 +function call to do the task. +.Pp +.Nm Update +is commonly invoked at startup time by +.Xr rc 8 +when the system goes multi-user. +.Sh SEE ALSO +.Xr sync 2 , +.Xr fsck 8 , +.Xr init 8 , +.Xr rc 8 , +.Xr sync 8 +.Sh BUGS +It is possible on some systems, that a +.Nm sync +occuring simultaneously with a crash may cause +file system damage. See +.Xr fsck 8 . +.Sh HISTORY +An +.Nm +command appeared in Version 6 AT&T UNIX. diff --git a/usr/src/usr.sbin/vipw/vipw.8 b/usr/src/usr.sbin/vipw/vipw.8 index 71728a1c3b..949e20dd9a 100644 --- a/usr/src/usr.sbin/vipw/vipw.8 +++ b/usr/src/usr.sbin/vipw/vipw.8 @@ -1,55 +1,67 @@ -.\" Copyright (c) 1983 The Regents of the University of California. +.\" Copyright (c) 1983, 1991 The Regents of the University of California. .\" All rights reserved. .\" .\" %sccs.include.redist.man% .\" -.\" @(#)vipw.8 6.6 (Berkeley) %G% +.\" @(#)vipw.8 6.7 (Berkeley) %G% .\" -.TH VIPW 8 "" -.UC 4 -.SH NAME -vipw \- edit the password file -.SH SYNOPSIS -.B vipw -.SH DESCRIPTION -.I Vipw -locks the password file and makes a temporary copy of it for editing. -The user's editor (or by default, -.IR vi (1)) -is run on the copied file. -.PP -Once the file has been edited, -.I vipw -runs the program -.IR pwd_mkdb (8). -.I Pwd_mkdb -performs a number of consistency checks on the password entries, and will -not allow a password file with a ``mangled'' entry to be installed. +.Dd +.Dt VIPW 8 +.Os BSD 4 +.Sh NAME +.Nm vipw +.Nd edit the password file +.Sh SYNOPSIS +.Nm vipw +.Sh DESCRIPTION +.Nm Vipw +edits the password file after setting the appropriate locks, +and does any necessary processing after the password file is unlocked. +If the password file is already locked for editing by another user, +.Nm vipw +will ask you +to try again later. The default editor for +.Nm vipw +is +.Xr vi 1 . +.Pp +.Nm Vipw +performs a number of consistency checks on the password entries, +and will not allow a password file with a +.Dq mangled +entry to be +installed. If -.I pwd_mkdb -rejects the new file, the user is prompted to re-enter the edit session. -Once the file is found to be satisfactory, -.I pwd_mkdb -installs it as the new password file. -.PP -If the password file is already locked, you will be told to try again -later. -.SH FILES -/var/db/pwd.db Insecure password database file -.br -/var/db/spwd.db The secure password database file -.br -/etc/master.passwd The current password file -.br -/etc/passwd A Version 7 format password file -.br -/etc/vipw.XXXXXX Temporary copy of the password file -.SH ENVIRONMENT -.TP -EDITOR -The editor used; the default is -.IR vi (1). -Any user specified editor is expected to take the file name it will -edit as its first argument. -.SH SEE ALSO -chpass(1), passwd(1), passwd(5), adduser(8), pwd_mkdb(8) +.Nm vipw +rejects the new password file, the user is prompted to re-enter +the edit session. +.Pp +Once the information has been verified, +.Nm vipw +uses +.Xr pwd_mkdb 8 +to update the user database. This is run in the background, and, +at very large sites could take several minutes. Until this update +is completed, the password file is unavailable for other updates +and the new information is not available to programs. +.Sh ENVIRONMENT +If the following environment variable exists it will be utilized by +.Nm vipw : +.Bl -tag -width EDITOR +.It Ev EDITOR +The editor specified by the string +.Ev EDITOR +will be invoked instead of the default editor +.Xr vi 1 . +.El +.Sh SEE ALSO +.Xr chpass 1 , +.Xr passwd 1 , +.Xr passwd 5 , +.Xr adduser 8 , +.Xr pwd_mkdb 8 +.Sh HISTORY +The +.Nm +command appeared in +.Bx 4.0 . -- 2.20.1